[House Hearing, 115 Congress] [From the U.S. Government Publishing Office] DHS FINANCIAL SYSTEMS: WILL MODERNIZATION EVER BE ACHIEVED? ======================================================================= HEARING before the SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION __________ SEPTEMBER 26, 2017 __________ Serial No. 115-29 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.govinfo.gov __________ U.S. GOVERNMENT PUBLISHING OFFICE 28-418 PDF WASHINGTON : 2018 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Sheila Jackson Lee, Texas Mike Rogers, Alabama James R. Langevin, Rhode Island Jeff Duncan, South Carolina Cedric L. Richmond, Louisiana Lou Barletta, Pennsylvania William R. Keating, Massachusetts Scott Perry, Pennsylvania Donald M. Payne, Jr., New Jersey John Katko, New York Filemon Vela, Texas Will Hurd, Texas Bonnie Watson Coleman, New Jersey Martha McSally, Arizona Kathleen M. Rice, New York John Ratcliffe, Texas J. Luis Correa, California Daniel M. Donovan, Jr., New York Val Butler Demings, Florida Mike Gallagher, Wisconsin Nanette Diaz Barragan, California Clay Higgins, Louisiana John H. Rutherford, Florida Thomas A. Garrett, Jr., Virginia Brian K. Fitzpatrick, Pennsylvania Ron Estes, Kansas Brendan P. Shields, Staff Director Steven S. Giaier, Deputy Chief Counsel Michael S. Twinchek, Chief Clerk Hope Goins, Minority Staff Director ------ SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY Scott Perry, Pennsylvania, Chairman Jeff Duncan, South Carolina J. Luis Correa, California John Ratcliffe, Texas Kathleen M. Rice, New York Clay Higgins, Louisiana Nanette Diaz Barragan, California Ron Estes, Kansas Bennie G. Thompson, Mississippi Michael T. McCaul, Texas (ex (ex officio) officio) Ryan Consaul, Subcommittee Staff Director Erica D. Woods, Interim Subcommittee Minority Staff Director C O N T E N T S ---------- Page Statements The Honorable Scott Perry, a Representative in Congress From the State of Pennsylvania, and Chairman, Subcommittee on Oversight and Management Efficiency: Oral Statement................................................. 1 Prepared Statement............................................. 2 The Honorable J. Luis Correa, a Representative in Congress From the State of California, and Ranking Member, Subcommittee on Oversight and Management Efficiency: Oral Statement................................................. 3 Prepared Statement............................................. 4 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Prepared Statement............................................. 5 Witnesses Mr. Chip Fulghum, Deputy Under Secretary for Management, U.S. Department of Homeland Security: Oral Statement................................................. 6 Prepared Statement............................................. 7 Ms. Michele F. Singer, Director, Interior Business Center, U.S. Department of the Interior: Oral Statement................................................. 10 Prepared Statement............................................. 11 Ms. Elizabeth Angerman, Executive Director, United Shared Services Management, Office of Government-Wide Policy, U.S. General Services Administration: Oral Statement................................................. 13 Prepared Statement............................................. 14 Mr. Asif A. Khan, Director, Financial Management and Assurance, U.S. Government Accountability Office: Oral Statement................................................. 16 Prepared Statement............................................. 18 Appendix Questions From Chairman Scott Perry for Chip Fulghum............. 41 Questions From Chairman Scott Perry for Elizabeth Angerman....... 42 DHS FINANCIAL SYSTEMS: WILL MODERNIZATION EVER BE ACHIEVED? ---------- Tuesday, September 26, 2017 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency, Washington, DC. The subcommittee met, pursuant to notice, at 2 o'clock p.m., in Room HVC-210, Capitol Visitor Center, Hon. Scott Perry [Chairman of the subcommittee] presiding. Present: Representatives Perry, Duncan, Ratcliffe, Higgins, Estes, Correa, Rice, and Barragan. Mr. Perry. The Committee on Homeland Security Subcommittee on Oversight and Management Efficiency will come to order. The purpose of this hearing is to examine the failures and path forward with modernizing the Department of Homeland Security's financial systems. The Chair now recognizes himself for an opening statement. As the third-largest Federal Cabinet agency, the Department of Homeland Security, or DHS, has a duty to be an effective steward of taxpayer dollars. Sound management of its finances is vital to implementing the homeland security mission. With a multitude of priorities, including responding to major emergencies like Hurricanes Harvey and Irma, securing our porous borders, protecting cyber space and enforcing our immigration laws, DHS's senior leadership needs timely financial information to inform its decisions. In addition, DHS needs systems that can be fully protected against the latest cyber threats to ensure personal and other sensitive data isn't compromised. Unfortunately, the Department's third and latest attempt to modernize its flagging financial systems has failed and DHS is struggling to determine a solid path forward. DHS has been attempting to modernize its financial systems for well over a decade. The two previous attempts wasted, or cost, over $50 million to build a Department-wide integrated financial system. Following these failures--and I say that because we are still trying, we still don't have anything after the $50 million--but following these failures, DHS chose to modernize component financial systems with the most critical need first. In 2013, the Obama administration urged agencies to use Federal shared service providers to improve financial systems. Shortly thereafter, DHS decided to enter a discovery phase with the Interior Business Center, or the IBC, within the Department of Interior. By August 2014, DHS had entered into an agreement with the IBC to modernize systems for the Domestic Nuclear Detection Office, Transportation Security Administration, and the U.S. Coast Guard at a cost of $79 million. Congressional watchdogs at GAO, or the Government Accountability Office, warned in 2013 that DHS had an increased risk of, among other things, investing in and implementing systems that do not provide the desired capabilities and ineffectively use resources during its financial system modernization efforts. GAO's prediction came true. Costs for the project have ballooned to over $124 million as of August, about 60 percent more than the original estimate. However, the truth is that DHS has no idea how much it will cost in the end. TSA's modernized system will go live over 2 years later than planned and the Coast Guard system will not be modernized at all under the current agreement with the IBC. This outcome is simply astounding, reprehensible, and unacceptable from a pure cost standpoint, if not from an efficacy standpoint. It is proof that the Obama administration's Federal shared service provider concept was doomed to fail for such a large agency. GAO attributes the failure to numerous causes: Lack of proper planning, aggressive schedule, complex and changing requirements, increased cost, and management and communication failures. DHS is now rushing to implement a new strategy which will likely put taxpayer dollars at risk to waste. We are at a critical moment. DHS must fully engage with the private sector to help salvage this disaster. Leveraging industry's talents is what should have been done in the first place and is the only possible way DHS might right this ship. As a former small-business owner, it baffles me how the Federal Government can spend over 10 years and hundreds of millions of dollars and have so little to show for it. Businesses large and small have to modernize systems and processes every single day. It may be hard, but it doesn't take them decades and hundreds of millions of dollars to do it. Mr. Fulghum, you were on the ground floor of this effort. You were involved in the negotiations with the IBC and its implementation as the chief financial officer. I demand on behalf of the taxpayers a full explanation as to how we got here and what is being done to fix this mess. Quite frankly, the magnitude of this failure demands accountability by those in charge and it calls into question the management directorate's ability to lead critical management issues facing DHS in the future based on what has been done in the past. [The statement of Chairman Perry follows:] Statement of Chairman Scott Perry September 26, 2017 As the third-largest Federal cabinet agency, the Department of Homeland Security (DHS) has a duty to be an effective steward of taxpayer dollars. Sound management of its finances is vital to implementing the homeland security mission. With a multitude of priorities including responding to major emergencies like Hurricanes Harvey and Irma, securing our porous borders, protecting cyber space, and enforcing our immigration laws, DHS's senior leadership needs timely financial information to inform its decisions. In addition, DHS needs systems that can be fully protected against the latest cyber threats to ensure personal and other sensitive data isn't compromised. Unfortunately, the Department's third, and latest, attempt to modernize its flagging financial systems has failed, and DHS is struggling to determine a solid path forward. DHS has been attempting to modernize its financial systems for well over a decade. The two previous attempts wasted over $50 million to build a Department-wide integrated financial system. Following these failures, DHS chose to modernize component financial systems with the most critical need first. In 2013, the Obama administration urged agencies to use Federal shared service providers to improve financial systems. Shortly thereafter, DHS decided to enter a ``discovery phase'' with the Interior Business Center (IBC) within the Department of Interior. By August 2014, DHS had entered into an agreement with IBC to modernize systems for the Domestic Nuclear Detection Office, Transportation Security Administration, and the U.S. Coast Guard at a cost of $79 million. Congressional watchdogs at GAO warned in 2013 that DHS had ``an increased risk of, among other things, investing in and implementing systems that do not provide the desired capabilities and inefficiently use resources during its financial system modernization efforts.'' GAO's prediction came true. Costs for the project have ballooned to over $124 million as of August--about 60 percent more than the original estimate. However, the truth is that DHS has no idea how much it will cost in the end. TSA's modernized system will go live over 2 years later than planned and Coast Guard's system will not be modernized at all under the current agreement with IBC. This outcome is simply astounding, reprehensible, and unacceptable. It is proof that the Obama administration's Federal shared service provider concept was doomed to fail for such a large agency. GAO attributes the failure to numerous causes: Lack of proper planning, aggressive schedule, complex and changing requirements, increased costs, and management and communication failures. DHS is now rushing to implement a new strategy, which will likely put taxpayer dollars at more risk to waste. We are at a critical moment; DHS must fully engage with the private sector to help salvage this disaster. Leveraging industry's talents is what should have been done in the first place and is the only possible way DHS might right this ship. As a former small business owner, it baffles me how the Federal Government can spend over 10 years and hundreds of millions of dollars and have so little to show for it. Businesses, large and small, have to modernize systems and processes every day; it may be hard but it doesn't take them decades and hundreds of millions of dollars to do it. Mr. Fulghum, you were on the ground floor of this effort. You were involved in the negotiations with IBC and its implementation as the chief financial officer. I want a full explanation as to how we got here and what's being done to fix this mess. Quite frankly, the magnitude of this failure demands accountability by those in charge and it calls into question the Management Directorate's ability to lead critical management issues facing DHS in the future. Mr. Perry. The Chair now recognizes the Ranking Minority Member of the subcommittee, the gentleman from California, Mr. Correa, for his statement. Mr. Correa. Thank you, Chairman Perry. I want to thank our witnesses here today, a very important hearing, very important issues. An area critical to our Nation's security as well as safeguarding taxpayer dollars, there is a need for Department of Homeland Security to have a modern and effective information technology system. In 2013 under the Obama administration, the Office of Management and Budget instructed each Federal agency to implement a Federal shared service provider for financial systems management. The goal was simple: To support decision making and improve the Department's ability to provide timely and accurate financial reporting. Essentially, how much money we are spending, when are we spending it, and how we are spending it. Following OMB's guidelines, DHS immediately entered into an agreement with the Department of Interior's shared service provider, Interior Business Center, becoming the first Cabinet- level agency to move to a Federal provider for financial management. During a year-long discovery phase, many called into question IBC's ability to transfer large agencies the size of TSA and Coast Guard, yet the Department and IBC moved ahead with an agreement anyway. Unfortunately, the plan to transfer the Domestic Nuclear Detection Office, DNDO, TSA, and Coast Guard to an IBC solution failed. It is even more troubling that DHS spent millions of dollars, as our Chair has said, on this modernization effort with nothing really to show for it. Financial systems, financial management is key to the success of DHS and its mission. According to DHS financial statement auditors, despite receiving clean audits, DHS faces long-term challenges in sustaining a clean audit opinion and providing reliable, timely, and useful financial data to support operational decision making. These deficiencies have contributed to the GAO's decision to designate DHS management functions, including financial management, as high-risk. I hope today's witnesses can highlight the errors that occurred with the financial systems modernization effort and how DHS can move ahead toward achieving shared service solutions for financial systems. Let me say that having come from the State of California, what we believe is probably the fourth-largest economy in the world, IT was always a challenge in the State of California. It was always expensive, never done right, never on time, constant monitoring was needed. Big contracts, small contracts, private contracts, in-house contracts, always a challenge. At the end of the day, I think part of the solution is going to be constant monitoring, constant reports to this committee and others to make sure that whatever is being done in terms of implementing IT is being done right. With that, I yield the balance of my time, Mr. Chairman. [The statement of Ranking Member Correa follows:] Statement of Ranking Member J. Luis Correa September 26, 2017 This subcommittee has held hearings on a range of matters, some of which do not have bipartisan agreement. One area we do have common ground on, however, is the need for the Department of Homeland Security to have modern, effective information technology systems. In 2013, under the Obama administration, the Office of Management and Budget instructed each Federal agency to move towards a Federal shared service provider for financial systems management. This initiative was designed to strengthen access to, and quality of, financial information to support decision making and improve the Department's ability to provide timely and accurate financial reporting. Simply put, DHS should, at any given moment, know how money is being spent across the Department. In furtherance of OMB's guidelines, DHS quickly entered into an agreement with the Department of Interior's shared service provider, Interior Business Center (IBC), becoming the first Cabinet-level agency to move to a Federal provider for financial management. During a year- long discovery phase, many called into question IBC's ability to migrate large agencies the size of TSA and Coast Guard, yet the Department and IBC moved forward with an agreement. Unfortunately, the plan to migrate DNDO, TSA, and Coast Guard to an IBC solution failed due to a number of problems, including insufficient product delivery, incompatible expectations, and unexpected delays. I am troubled to hear that despite such a lengthy discovery period, neither IBC nor DHS predicted this unfortunate result. It is even more troubling that DHS spent millions of dollars on this modernization effort with nothing to show for it. Financial systems management is critically important to the success of DHS in fulfilling its mission. According to DHS financial statement auditors, despite receiving clean audits, DHS faces long-term challenges in sustaining a clean audit opinion and providing reliable, timely, and useful financial data to support operational decision making. These deficiencies contributed to GAO's decision to designate DHS's management functions, including financial management, as high-risk. I hope today's witnesses can shine light onto the errors that occurred with the financial systems modernization effort and the manner in which DHS can move towards achieving a shared service solution for its financial systems. Too often, DHS has failed to establish effective management and oversight of its IT improvement efforts. It is time for DHS to fix the out-of-date, inefficient IT systems currently in use and address these issues once and for all. Mr. Perry. The Chair thanks the gentleman from California. Other Members of the subcommittee are reminded that opening statements may be submitted for the record. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson September 26, 2017 The recent hurricanes illustrate that when a crippling natural disaster or other major incident hits our country, the Department of Homeland Security needs a precise understanding of both its human and financial resources in order to make timely decisions that will ultimately affect the American people. Its goes without saying that knowing how funds are distributed and spent throughout the Department at any given moment is critical to ensuring taxpayer dollars are spent effectively and efficiently. Throughout my tenure on this committee we have initiated multiple GAO audits and held oversight hearings on financial systems modernization, and it is clear that it is more than an uphill battle for DHS. For over a decade, DHS has attempted to modernize its financial systems, and has been unsuccessful to date. Since DHS's inception there have been three failed attempts to modernize the agency's financial systems--leaving billions of taxpayer dollars wasted. Before DHS embarks on another attempt to modernize its financial systems it should at least have an adequate and thorough roadmap of how this modernization is to be achieved. Unfortunately, President Trump has made it clear that financial systems modernization is not a priority at DHS, leaving the fate of financial management systems modernization uncertain. Under the President's budget, DHS would lose $41 million toward its Financial Systems Modernization program. The President's misguided priorities for DHS include diverting critical resources away from information technology improvements towards fulfilling campaign fantasies, such as a multi-billion dollar wall along the Southern Border. I look forward to hearing from the witnesses today about the lessons learned from previous modernization efforts and how DHS can move forward in a positive direction for the good of the Department and out of respect for the American taxpayers' hard-earned dollars. Mr. Perry. We are pleased to have a distinguished panel of witnesses before us today. The witnesses' entire written statements will appear in the record. The Chair will introduce the witnesses first and then recognize each of you for your testimony. The honorable Chip Fulghum is the deputy under secretary for management at DHS. Mr. Fulghum joined DHS in October 2012 as its budget director and has served in numerous senior positions including acting deputy secretary, acting under secretary for management, and chief financial officer. Prior to joining the Department, Mr. Fulghum served for 28 years in the United States Air Force retiring with a rank of colonel. We thank him for his service. Ms. Michele Singer has been the director of the Interior Business Center in the Department of Interior since June 2015. In this capacity, she leads delivery of shared services to support interior offices and bureaus as well as over 150 other Federal agencies. Ms. Singer previously worked on issues related to Indian Affairs and joined the Department of Interior in 2000. Welcome. Ms. Elizabeth Angerman--is that correct, did I--thank you, ma'am--has been executive director of Unified Shared Services Management at the General Services Administration, or the GSA, since October 2015. In this position, she provided agencies input and advice on best practices related to designing and executing shared administrative functions. Prior to GSA, Ms. Angerman was executive director of the Office of Financial Innovation and Transformation, or FIT, in the Treasury Department. Welcome. Finally, Mr. Asif Khan is a director for financial management and assurance issues at the U.S. Government and Accountability Office. Mr. Khan leads GAO's evaluations related to financial management issues at the Department of Homeland Security and Department of Defense. Mr. Khan joined the GAO in January 2009 after almost 20 years in public accounting with major firms auditing and advising U.S. Government agencies. We welcome him. The Chair now recognizes Mr. Fulghum for his opening statement. Sir. STATEMENT OF CHIP FULGHUM, DEPUTY UNDER SECRETARY FOR MANAGEMENT, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Fulghum. Chairman Perry, Ranking Member Correa, thank you for the opportunity to appear today to discuss our efforts regarding financial systems modernization. Today I will focus my comments on the need for modernization, the experience with the shared service model, what we have delivered to date, our lessons learned, and our path forward. Since the Department's inception, we have had a clear need for modernized financial solutions, given that some of today's systems lack functionality, aren't integrated, contribute to data inconsistency, rely on old, outdated technology, and create additional security risks, all of which leads to manual processes, workarounds, and creates internal control business process risks. Despite that fact, I am very proud of the fact that since 2013 the Department of Homeland Security has earned four straight clean audits, which clearly demonstrates our ability to be good stewards of the taxpayers' money. We still, however, need modernized solutions. Beginning in 2013, we followed OMB direction via memorandum MD13-08 to pursue a Federal shared service model. We were the first large Cabinet-level agency to do so. Despite a limited availability of shared service providers, we partnered with IBC based on the fact that they were certified by Treasury, FIT, and the fact that their leadership provided assurance that they would have the capability and the resources necessary to service a large Federal Cabinet agency. Over the next 3\1/2\ years, we have experienced numerous challenges to include schedule delays and cost increases, which are unacceptable, primarily driven by a lack of understanding of our business requirements and the inability of IBC to adequately staff up. This caused me to pause the program twice, the first time in 2015 and again in 2016 when I made the decision along with IBC to end the relationship with IBC. In spite of these challenges, we have an integrated financial solution that works and is the foundation of the effort moving forward for what is known as the TRIO. Each day, that system, that has been in place for over 2 years, makes payments, records accurate obligations, provides timely financial reporting, provides monthly financial statements, writes contracts, records those obligations in an integrated fashion into our financial system, provides real- time funds check and has improved our internal control capability. This system meets 75 percent of the requirements. When TSA functionality is available in October, we will be over 80 percent, which was the plan from the start. Given past challenges and the lessons learned, we have determined that IBC's business model does not meet the needs of a large Federal agency. Moving forward, we will leverage the investment made in the system and solution that works and build on the lessons learned to finish out the United States Coast Guard. To do this, we will have more frequent check-ins and more thorough testing of the system, more incremental releases, and we will have built-in transparency of cost and schedule with a contractor and a contracting mechanism that is simplified and performance-based. We have restructured our program office to have clear accountability. We will continue to have oversight from both the Department, USSM, and OMB. We will be able to fully leverage the Department's resources to include management of various lines of businesses, which, as GAO has noted in its most recent high-risk report, continues to mature its processes and reduce the number of high-risk items. In closing, I believe we have a solid path forward, but there is still risk. There is funding risk, there is continued risk of litigation, there is technical risk, and there is staffing risk. We will manage those risks by using the recommendations from GAO in their recent audit to manage more effectively those risks. We owe you further results and the buck stops with me. I remain committed and accountable to deliver results and build on the system that is working today. [The prepared statement of Mr. Fulghum follows:] Prepared Statement of Chip Fulghum September 26, 2017 Chairman Perry, Ranking Member Correa, and distinguished Members of the subcommittee, thank you for the opportunity to appear today to discuss financial systems modernization (FSM) at the Department of Homeland Security (DHS). My comments will focus on our progress to date, challenges we have experienced, and why we are on the right path for this initiative. We acknowledge that improving DHS financial management systems has been a long-term effort, but during our recent modernization efforts, we have achieved successes, and continue to achieve planned milestones. Twenty-three months ago, we successfully moved the Domestic Nuclear Detection Office (DNDO) to a new shared services baseline solution that provides increased functionality, reduces audit risk, and provides real-time integration. We are preparing to move the Transportation Security Administration (TSA) functionality into production. The current solution meets 75 percent of DNDO, TSA, and the U.S. Coast Guard's (USCG) requirement needs. Once TSA is in production, 85 percent of DHS functional requirements for DNDO, TSA, and the USCG financial, acquisition, and asset management will be met. Additionally, U.S. Customs and Border Protection (CBP) is on a modernized platform, the Federal Law Enforcement Training Centers (FLETC) have performed a successful upgrade to its current financial system, and the U.S. Secret Service is finalizing its implementation of a solution upgrade to occur in October 2017. We will continue to build on these successes as we move forward. DHS has had a critical need to modernize its financial management systems from its inception. When DHS was first established, there were 13 separate core financial systems across its components, operating under legacy policies and disparate business processes. These systems were comprised of outdated technology, were mostly non-integrated--with many still relying on manual processes which led to inconsistent data and reporting--and did not fully support DHS goals of strong, integrated internal controls and enhanced efficiency and security. Previous attempts to integrate DHS components' financial, asset, and acquisition management systems include the 2004 eMerge\2\ Program, which was halted due to its inability to build the necessary and critical integration among various commercial software products, and the Transformation and Systems Consolidation (TASC) program. The Department's efforts to modernize its financial management systems have been subject to repeated legal challenges before the Government Accountability Office (GAO), the U.S. Court of Federal Claims, and the Court of Appeals for the Federal Circuit. Most recently, the Inter-Agency Agreement process with the Department of the Interior (DOI) was challenged. The Department prevailed in that litigation (and the appeal) in October 2016. Despite having a complex mission and systems that are not interoperable, DHS has been able to achieve and sustain an unmodified-- clean--audit opinion on our financial statements for the past 4 years. Working together, the financial management community launched a multi-year effort to drive the Department toward a clean audit opinion and a full accounting for how it spends taxpayer dollars. Through dedication of senior leadership, development and implementation of standard policies and processes for financial reporting such as the DHS Accounting Classification Structure (ACS) and Common Appropriation Structure (CAS), hiring of talented professionals, commitment of our workforce, improvement of our business intelligence tools, and consistent and continuous training, DHS has achieved audit success and reduced the number of material weaknesses in our internal controls over financial reporting from 18 to 3. After the TASC program was halted, DHS again moved to meet its financial management system needs by following direction provided by the Under Secretary for Management (USM) in a September 2011 memorandum, Moving Forward with Financial Systems Projects. The approach was to modernize components with the greatest business need for modernized financial management systems and leverage business intelligence to aggregate data in lieu of acquiring a Department-wide solution. In establishing the FSM program, we followed the OMB memorandum M- 13-08, Improving Financial Management Systems Through Shared Services, which prescribed a shared service approach for new core accounting systems proposals or mixed systems upgrades. Following the direction of the previous USM and the OMB directive's guidance, DHS identified the USCG, with TSA and DNDO as their customers, as the components with the most critical need to update their current system. OMB provided a limited number of Federal Shared Service Providers (FSSP) certified to service large Cabinet-level agencies such as DHS. The DOI's Interior Business Center (IBC) is one of four OMB-designated FSSPs certified through Treasury's Office of Financial Innovation and Transformation (FIT). In 2013, DHS established an Inter-Agency Agreement for a Discovery phase to evaluate the IBC solution and its fit for DNDO, TSA, and the USCG. Through the Discovery process, IBC validated they could transition the three components to their solution, and DHS confirmed that the IBC solution would meet the components' functional and operational support needs. DHS and IBC worked closely with OMB and Treasury to obtain approval to proceed with implementation. As a pilot, DNDO, a small DHS component, migrated to the accounting solution in November 2015 and then migrated to the procurement part of the solution in March 2016. Overall, this integrated solution provides improved functionality and integration, has a lower risk of information security issues, will provide a consolidated view of project costs across components, and increases transparency and reliability of information. The solution also supports the implementation of the DHS ACS. Throughout our 4-year partnership, there have been several challenges including an incomplete understanding of the requirements and complexities related to providing a standard solution for a Cabinet-level agency the size of DHS. The recent GAO audit also highlighted five categories that name many of the areas where we faced these challenges: Complex requirements, project resources, project schedule, project cost, and project management and communications. Late in 2016, IBC informed DHS they would not be able to continue the USCG implementation and could not support further engagement activities with other DHS components as planned. DHS and IBC agreed that preserving the investment DHS has made is now paramount and will move us forward while delivering the best value for the Government. However, the current structure of the project between IBC and DHS is not sustainable. DHS and IBC determined the best path is to move the software solution to a new hosting location, or data center, and for DHS to assume operation of the system while we continue the TSA and USCG migrations. Both IBC and DHS have worked closely together to build out the remaining requirements for TSA. TSA will transition to the system once data migration, user training, and organizational change management activities are complete, the system stability has been proven, and any risks to auditability are mitigated. Moving forward, our FSM approach will shift from leveraging FSSPs to reemphasizing the DHS business process standardization and further reducing our system footprint where possible. We have found our personnel have the deepest understanding of DHS mission needs and how they are best supported through systems and processes. Our management team remains fully engaged and integrated; the Office of the Chief Information Officer and the Office of the Chief Procurement Officer are particularly involved in the day-to-day work of implementing our integrated financial management solution. We have reached out to components and brought in additional subject-matter expertise across relevant business process areas, strengthened our testing and evaluation program, involved systems engineers from the DHS Science & Technology Directorate, and are working closely with the Office of Program Accountability and Risk Management to meet best practices and minimize risks. The decision to leverage the solution currently in use by DNDO provides the best available option to meet DHS financial management needs for TSA and USCG within a reasonable time frame. DHS will preserve its robust governance structure, with Acquisition Review Board oversight, and a fully engaged FSM Executive Steering Committee. Additionally, the DHS management chiefs and components will continue working closely together to ensure success as the FSM initiative moves forward. To apply the lessons learned from the IBC engagement and better support the initiative going forward, DHS has changed its implementation approach from individual component projects to a single initiative and added a Joint Program Management Office (JPMO). The JPMO provides centralized program governance and streamlined decision making; This stands in contrast to our effort with IBC, where governance and decision making was split across two entities. The JPMO is responsible for successful execution, schedule maintenance, risk management, and all other program management activities. The JPMO is staffed with DHS Headquarters and component subject-matter experts working together to better identify and mitigate risk, implement risk mitigation plans, increase component integration, and support business process standardization across the Department. DHS will leverage internal program management processes and expertise to lead the program and introduce implementation support tools to perform requirements management, evaluate system performance, and coordinate and document testing. We will require earned value management from our vendors and establish quality controls for services and deliverables. We will increase transparency into costing and status, using a time and materials methodology initially and transitioning to a firm fixed price once we have a very clear picture of our detailed requirements for the hosting and system integrators. The GAO-17-799 Report examines the extent to which DHS followed best practices in analyzing alternatives and selecting its FSM approach; whether DHS used best practices when managing the risks of using IBC; and the key factors and challenges that have impacted the FSM program and DHS's plans for completing key priorities. DHS concurs with both GAO recommendations to improve guidance related to conducting Analysis of Alternatives and to improve our risk management approach. Actions are already in progress to address these recommendations, and they will be incorporated into the current FSM efforts. In summary, DHS has made a significant investment in the IBC financial management solution, which has delivered a standardized baseline solution with increased functionality and integration for DNDO and will deliver improved financial operations for TSA and USCG when they migrate. We will continue to move forward, exercising sound business judgment, obtaining the best value for the Department, and striving for a wise use of public resources while maintaining our clean audit opinion, mitigating risks, and incorporating lessons learned. We cannot keep patching our legacy systems at components and never realize the benefits that come from moving to a modern integrated business solution that meets our requirements. We will continue to keep you updated on the progress of our plan for the transition from IBC. Chairman Perry, Ranking Member Correa, and distinguished Members of the subcommittee, thank you again for the opportunity to testify today and I look forward to your questions. Mr. Perry. Thank you, Mr. Fulghum. The Chair now recognizes Ms. Singer for an opening statement. Ma'am. STATEMENT OF MICHELE F. SINGER, DIRECTOR, INTERIOR BUSINESS CENTER, U.S. DEPARTMENT OF THE INTERIOR Ms. Singer. Thank you. Chairman Perry, Ranking Member Correa, and Members of the subcommittee, thank you for this opportunity to discuss the Department of Homeland Security financial system modernization program. I am Michele Singer, the director of the Interior Business Center at the U.S. Department of the Interior, and I began overseeing this program for IBC in April 2016. The Interior Business Center is a certified Federal shared service provider in financial management and human resources and payroll. We are also an authorized provider for acquisition services. Currently, we serve more than 170 Federal agencies and organizations. Like other shared service providers, IBC supports customer agencies' missions by providing critical business and administrative support. The Interior Business Center operates a customer-funded, full cost-recovery business model and does not receive any appropriated funds. These unique circumstances can present significant challenges for scaleability, particularly in migrating Cabinet-level agency components to a common shared service solution. In partnership with IBC since 2014, DHS has undertaken an effort to modernize, consolidate, and integrate the agency's vast financial resources and assets. The scheduling costs provided for in this project were based on requirements designed to be implemented and shared across the DHS TRIO component. Over evolution of this program, the identification of additional requirements resulted in a deviation from a shared model to a more customized and expensive solution. Increasing resources to accommodate these needs has and will continue to increase the overall cost of the program. The engagement between IBC and DHS has resulted in the creation of valuable assets. These assets can and will be transitioned, ensuring that the investments made to date are preserved. This program has experienced a number of complex and multifaceted challenges, yet it has also provided for an opportunity for lessons learned regarding the feasibility and execution of the shared services implementation of a large federated agency. I would like to highlight just a few of those lessons learned for you today. To achieve strong adoption of standard business processes, customer agencies must evaluate their complex business processes with a willingness to differentiate and potentially eliminate those disparate processes that are not legally mandated. With shared services model, existing business processes must converge into unified processes that can be shared amongst all components and amongst different agencies. This requires a strong centralized management team designated in power to drive standardization. Someone must have the authority to say no to individualized requests supporting a single component. Customer agencies must have a clearly-defined communications strategy that ensures all stakeholders are engaged at appropriate times and the customer agencies should not defer to a service provider to communicate across its organization. Service providers must help a customer agency execute a comprehensive training plan that needs to ensure employees understand how to do their jobs within new processes, not just how to operate the system. Moving to a shared service provider for mission support services is challenging; however, with effective change management plan and business process reengineering, Federal agencies can modernize their financial management systems and realize the benefits of a shared service solution. Thank you for this opportunity, and I do look forward to your questions. [The prepared statement of Ms. Singer follows:] Prepared Statement of Michele F. Singer September 26, 2017 Chairman Perry, Ranking Member Correa, and Members of the subcommittee, thank you for this opportunity to discuss the Department of Homeland Security (DHS) Financial Systems Modernization (FSM) Program. I am Michele Singer, the director of the Interior Business Center (IBC) at the U.S. Department of the Interior (Interior). I began overseeing the DHS FSM Program for IBC in April 2016. The Interior Business Center is a certified Federal shared services provider in financial management and human resources/payroll, and an authorized provider for acquisition services. Currently, we serve more than 170 Federal agencies and organizations, and like other shared service providers, IBC supports customer agencies' missions by providing critical business and administrative support services. In partnership with IBC since 2014, DHS has undertaken an effort to modernize, consolidate, and integrate the agency's vast financial resources and assets. The DHS FSM Program included prioritization of the DHS components with the most critical business need to modernize their financial management systems. Integration of the modernized financial systems with asset management and acquisition systems would result in component-level integrated financial management systems. With this effort, DHS became the first Cabinet-level agency to engage a Federal shared services provider to modernize its core financial system. Following the roadmap defined by the Office of Management and Budget and the Department of the Treasury Office of Financial Innovation and Transformation that encouraged agencies to use certified Federal providers for their future modernization efforts, IBC and DHS entered into an interagency agreement (IAA) for the financial system implementation of the DHS ``Trio'' components: USCG, TSA, and DNDO. Before signing the agreement in August 2014, IBC completed a discovery effort with DHS to determine if IBC's Federalized Oracle Federal Financials solution \1\ would meet the financial management systems needs of the DHS Trio components. --------------------------------------------------------------------------- \1\ Using off-the-shelf functionality as a baseline, IBC implements and maintains a preconfigured version of Oracle Federal Financials that incorporates processes common to Federal agencies. The application is hosted in a shared environment. In addition to the integrated modules that make up the core financials solution, the preconfigured version supported by IBC also includes a set of standard reports, which provides general data elements that are used by most Federal agencies. --------------------------------------------------------------------------- The IBC operates a customer-funded, full-cost recovery business model in the working capital fund and Interior Franchise Fund and does not receive appropriated funds.\2\ These unique circumstances can present significant challenges for scalability, particularly in migrating Cabinet-level agency components to a common, shared service solution. The schedule and costs presented in the IAA were based on specific requirements designed to be implemented and shared across the DHS Trio components. Over the evolution of this program, the identification of additional, unique DHS and component requirements resulted in a deviation from a shared model to a more customized and expensive solution. Increasing resources to accommodate the more custom solution has--and will continue to--increase the overall cost of the DHS FSM Program. --------------------------------------------------------------------------- \2\ Interior's Working Capital Fund was established pursuant to 43 U.S. Code Sec. 1467. The Interior Franchise Fund was established pursuant to the Omnibus Consolidated Appropriations Act of 1997, Pub. L. 104-208. --------------------------------------------------------------------------- In January 2017, IBC and DHS began planning for a transition of the DHS FSM Program components to a new environment. Transitioning the program to a DHS-only environment has been chosen as the path forward due to the unique and complex requirements that are incongruous with the shared service model. The engagement between the IBC and DHS has resulted in the creation of valuable assets that can and will be transitioned, ensuring that the investments made to date are preserved. This program has experienced a number of complex and multifaceted challenges, yet it has also provided an opportunity for lessons learned regarding the feasibility and execution of a shared services implementation for a large, federated agency. I would like to highlight some of these lessons learned for the subcommittee today. business process documentation and redesign To successfully implement a shared service solution, customer agencies play an important role in their organizations' change management. To achieve strong adoption of standard business processes, customer agencies must evaluate their complex business processes with a willingness to differentiate (and potentially eliminate) disparate processes that are not legally mandated. Additionally, a documented approach for transition, arbitration, and change management must be communicated and understood by all agency components, obtaining buy-in and understanding of how the new system will operate. governance With a shared service model, existing business processes must converge into unified standard processes that can be shared between all components within an agency. This requires a strong, centralized management team designated and empowered to drive standardization across the entire organization. Someone must have the authority to say ``no'' to individualized requests supporting a single component. stakeholder communication and engagement Customer agencies must have a clearly-defined communication strategy that ensures that all stakeholders are engaged at the appropriate times. The customer agency should not defer to or rely on the service provider to communicate across its organization. training Service providers should help customer agencies execute a comprehensive training plan that ensures employees understand how to do their jobs within the new processes, not just how to use the system. This training should include a crosswalk, comparing how business processes are done today with how they will be done in the new system. Moving to a shared provider for mission support services is challenging. However, with an effective change management plan and business process reengineering, Federal agencies can modernize their financial management systems and realize the benefits of a shared service solution. Thank you and I look forward to your questions. Mr. Perry. The Chair thanks you, Ms. Singer. The Chair now recognizes Ms. Angerman for an opening statement. STATEMENT OF ELIZABETH ANGERMAN, EXECUTIVE DIRECTOR, UNITED SHARED SERVICES MANAGEMENT, OFFICE OF GOVERNMENT-WIDE POLICY, U.S. GENERAL SERVICES ADMINISTRATION Ms. Angerman. Thank you. Chairman Perry, Ranking Member Correa, and Members of the committee, it is a pleasure to appear before you today. My name is Beth Angerman and I am the executive director of the Unified Shared Services Management Office in the General Services Administration. I have served the Federal Government as a career employee for 12 years and spent the majority of my career focused on Government-wide programs helping to consolidate and centralize common administrative activities. My comments today will focus on the potential benefits that shared services could bring to the Federal Government and the lessons learned that are shaping the path forward. The need for modernization of aging and high-risk IT systems is an on-going concern for senior leadership across the Federal landscape. The challenge of funding, managing, and securing legacy systems distracts resources from the critical missions that Federal agencies are accountable to deliver. Furthermore, the work force is performing very similar and duplicative work across Government and is doing so oftentimes following manual and legacy processes. Agencies have been asked to assess how they can reduce this duplication and put more resources on mission work. Shared services is an industry best practice that can help. The USSM office was created within GSA in 2015 to design the standards for more integrated solutions across administrative functions, provide transparency into the performance of shared service providers, and to provide advice and best practices to agencies who are planning these kinds of transformative efforts. The Federal Government has been sharing services for more than 40 years, but with varying degrees of success. In 2004, the Government consolidated 26 different payroll systems to four and saved the Government over $1 billion over 10 years. More than 70 percent of the Government is using a shared solution for personnel action processing systems and over 85 percent of all payments are processed from a centralized system at the Department of Treasury. Despite this progress, the Government still lags behind private industry in adopting shared services as a best practice. The Federal Government has over 100 time-and- attendance systems and over 40 financial management systems. These are just two of several examples of the duplications that exist today. The Government can do better, but we must acknowledge the lessons learned as critical input to the strategy moving forward. Those lessons and best practices are published in a playbook by USSM to assist agencies in the pivot to a shared environment. USSM engaged with several agencies, including the Departments of the Interior and Homeland Security, and industry experts to inform the creation of the USSM playbook. The partnerships delivered a functional financial management solution that DHS is confident will meet the majority of their complex needs and they intend to protect the investment as they transition forward. Over the course of the last 2 years, USSM has informed the program on best practices to improve change management, integrated project management and risk management, and many improvements were made. However, the gap between the complex needs of a large Cabinet-level agency like DHS and the intended service delivery mode at IBC has led these agencies to end their partnership. This experience has uncovered a critical opportunity for the Government to document what capabilities it requires in the future of administrative systems. USSM has designed a methodology and governance structure for capturing and maintaining those requirements inclusive of standard data definitions. The Federal community will need to reconcile the differences that exist among them today and agree on standard business rules for common functions. While uniquenesses do exist because of vastly different missions and legislation, it is a common belief that there is more alike about us than different. This work, coordinated by my office, will allow the Government to leverage its buying power and manage risk by sharing the burden of maintaining and securing technology with industry. The Government has too many legacy systems today. If we let agencies replace those systems without consolidating, we will be building the legacy systems of tomorrow without access to capital to maintain them. This is challenging work and it requires leadership to see the long-term potential, but if we are successful we will have more time, energy, and resources to dedicate to missions and better meet the needs of American taxpayers. I am grateful for the opportunity to speak with you today, and I would welcome any questions from the committee. [The prepared statement of Ms. Angerman follows:] Prepared Statement of Elizabeth Angerman September 26, 2017 Chairman Perry, Ranking Member Correa, and Members of the subcommittee, it is a pleasure to appear before you today. My name is Elizabeth Angerman and I am the executive director of the Office of Unified Shared Services Management at the U.S. General Services Administration (GSA). My comments today will focus on the potential benefits that shared services could bring to the Federal Government and the lessons learned that are shaping the role that GSA will play to help agencies recognize those benefits. The need for modernization of aging and high-risk IT systems is an on-going concern for senior leadership across the Federal landscape. The challenge of funding, managing, and securing legacy systems distracts resources from the critical missions that Federal agencies are accountable to deliver. Furthermore, common processes to hire and retain Federal employees, process accounting transactions, and procure goods and services are also decentralized, redundant, and often manual. As agencies investigate ways to allocate more resources to their missions, GSA is well-positioned to advise agencies on best practices related to shared services and, more importantly, leverage the buying power of the Federal Government to provide contracts and services that deliver both modern technology and services that will drive standardization and efficiency across Government. The Unified Shared Services Management (USSM) office was created within GSA in 2015 to design the standards for more integrated solutions of administrative functions across lines of business, provide transparency into the performance of Federal Shared Service Providers to inform agency decision making, and to provide advice and guidance to agencies that are planning for new administrative solutions based on lessons learned and best practices. USSM's mission is to transform the way Government does business internally to improve the way the Government serves the American public. Given declining resources and a need to focus more on mission, the time has never been more right to understand how increased sharing can help agencies address these challenges. The Federal Government has been sharing services for more than 40 years with varying degrees of success. In 2004, the Government consolidated 26 different payroll systems to four, which saved the Government over $1 billion over 10 years.\1\ Today, more than 70 percent of Federal Government agencies use a shared solution for personnel action processing systems, and over 85 percent of payments are processed from a centralized system at the U.S. Department of Treasury. Last year, the U.S. Government Accountability Office (GAO) stated that ``moving to shared services can save the Federal Government billions of dollars as well as reduce duplicative efforts, decrease systems upgrades, and free up resources for mission-critical activities'' (GAO Report 16-477). --------------------------------------------------------------------------- \1\ https://www.opm.gov/services-for-agencies/hr-line-of-business/ cost-benefit-analysis/fy-2011-cost-benefit-analysis-report.pdf. --------------------------------------------------------------------------- Despite this progress, the Government still lags behind private industry in adopting shared services for daily business operations. In comparison, over 90 percent of Fortune 500 companies have implemented shared services.\2\ IBM, for example, in its Center for the Business of Government report, stated it reduced spending by $4 billion over 4 years through its own reorganization to a shared services model. Procter and Gamble saved $900 million in cost savings over an 8-year transformation. The Technology CEO Council, comprised of chief executive officers from some of America's largest IT companies, estimates shared services could lead to $47 billion in cost reductions for the Government over 10 years.\3\ --------------------------------------------------------------------------- \2\ https://www.pwc.com/us/en/outsourcing-shared-services-centers/ assets/hfs-report-pwc-developing-framework-global-services.pdf. \3\ ``The Government We Need'', Technology CEO Council, January 2016. --------------------------------------------------------------------------- The potential of shared services to save taxpayers money and make Government more efficient is clear, but there is still much work to be done to fully realize these benefits. According to the Office of Personnel Management's 2015 Human Resources Line of Business Strategic Framework, the Federal Government has over 100 time and attendance systems. The fiscal year 2016 Cross-Agency Priority Goal Report reports that the Federal Government has over 40 financial management systems, with many ancillary add-ons. While successful adoption of shared services has seen various levels of success across Government, these numbers alone clearly show this is an effort that should not be abandoned. Instead, the Government must acknowledge the lessons learned from both successes and failures as critical input to the shared service strategy moving forward. It is USSM's mission to ensure this happens. Over the last 2 years, USSM has consulted with many agencies that have partnered with Federal Shared Service Providers to provide advice and guidance on best practices and lessons learned to improve the likelihood of successful migrations and modernizations. These lessons and best practices impact both the behavior of customers (demand) and the expectations of providers (supply), and are published in a playbook to assist agencies in the pivot to a shared operational environment. The playbook provides guidance, templates, and a coordinated review process that can inform management and oversight of these investments and migrations. As part of its outreach, USSM engaged with the U.S. Department of Homeland Security (DHS) and the U.S. Department of the Interior to inform the creation of the USSM playbook. The partnership delivered a functional financial management solution that DHS claims meets the majority of their complex needs and they intend to protect the investment as they transition to the path forward. Over the course of the last 2 years, USSM has informed the program on best practices to improve change management, integrated program management, and risk management, and many improvements have been made. However, the gap between the complex needs of a large Cabinet-level agency like DHS and the current service delivery model at the Interior Business Center has led to the decision to end the partnership and for DHS to reclaim ownership of the system. We will continue to use our expertise to consult with DHS and other agencies, as appropriate, in their journey to modernize and improve their common administrative functions. The challenge for the Federal Government is that we have not been able to articulate, in a coordinated and consistent way, the agreed- upon business needs for common administrative systems and/or services. The shared solutions available to agencies today were not designed to meet the all-encompassing needs of large, Cabinet-level agencies. To address the lack of Government-wide standards, USSM has designed a methodology and governance structure for capturing and maintaining those standards, inclusive of required capabilities, data definitions, and the intersection of processes across multiple lines of business. The process to develop these standards involves many agencies working across administrative functions to deliver a Government-wide framework that can be the common baseline moving forward. While unique requirements do exist because of vastly different missions and statutory authorizations, it is a common belief that there is more about administrative functions that is alike than different. This work, coordinated by GSA USSM, will allow the Government to leverage its buying power for common capabilities and share the burden of maintaining and securing technology with industry. This is particularly critical as many of these common functions rely on legacy systems. With the right strategy, we cannot only retire these legacy systems, but also avoid building a new generation of future legacy systems by partnering with the private sector to get modern technology and keep that technology modern in the future. GSA's effort to advance shared services is about delivering a more efficient Government for the American people. The challenge we face collectively is how to manage the risk and reduce the barriers to successful modernization and migration. If we are successful in improving and consolidating mission support services, agencies will have resources to dedicate more time, energy, and funding to their missions to better satisfy the needs of the American public. I am grateful for the opportunity to speak with you today and look forward to working with the committee on our mutual goal of advancing a Government that works better and costs less. Thank you for your time today and I welcome any questions from the subcommittee. Mr. Perry. Thank you, Ms. Angerman. The Chair now recognizes Mr. Khan for an opening statement. STATEMENT OF ASIF A. KHAN, DIRECTOR, FINANCIAL MANAGEMENT AND ASSURANCE, U.S. GOVERNMENT ACCOUNTABILITY OFFICE Mr. Khan. Good afternoon, Chairman Perry, Ranking Member Correa, and Members of the subcommittee. I am here to discuss our recent work on the Department of Homeland Security's effort to improve its financial management and reporting and the difficult challenges they face. I would like to thank the subcommittee for holding this hearing. DHS's ability to manage its operations and reasonably ensure effective financial management has been hampered by deficiencies in its internal controls and its financial management systems. These deficiencies contributed to our decisions in designating DHS's management functions, including financial management, as a high risk in 2003. DHS has received a clean opinion on its financial statements for the past 4 years, which is commendable; however, financial management system deficiencies have continued to persist and contribute to a material weakness in DHS internal controls over financial reporting. Today, I will discuss the results of our recent review of DHS efforts to modernize its financial management systems that will assist in sustaining the clean opinion on its financial statements and help achieve effective internal controls over financial reporting management decision making. We reported in 2013 on challenges related to DHS's previous attempts to implement a Department-wide integrated financial management system. We also reported on material weaknesses that limit DHS's ability to process, store, and report financial data. Since our last report, DHS has adopted a decentralized approach evaluating options for modernizing its systems, including the use of shared service providers. As part of this effort, DHS initiated their TRIO project focused on migrating three DHS components, the Domestic Nuclear Detection Office, the Transportation Security Administration, and the Coast Guard, to a modernized financial management system provided by the Department of Interior's Interior Business Center, the IBC. The TRIO project is a key effort to address longstanding system deficiencies. Assessing and managing the risks associated with the projects are essential to realizing DHS's modernization goals. In our recent review, we found that DHS and the TRIO components did not fully follow best practices for conducting alternatives analysis for modernizing their financial management systems or for managing the risks related to its use of IBC on the TRIO project. We have made recommendations to address these concerns. Certain key challenges impacting the TRIO project emerged from our interviews with DHS, IBC, OMB, and other oversight agencies. We grouped these challenges into five broad categories. First, project resources. IBC experienced significant turnover in key positions over the course of this project. Second, project schedule. Migrating the TRIO components to IBC within the original time frame was a significant challenge, given the overall magnitude and complexity of the project. Third, complex requirements. Early in the TRIO project, DHS and IBC agreed to use a newer and unproven technology in this environment, which introduced additional complexity to the project's requirements. Fourth, project costs. These increased significantly due to schedule delays, unanticipated complexities, and other challenges. Last, project management and communication. The TRIO project team primarily focused on the delivery of technology at the expense of other project management activities, such as organizational change management and communication management. Eventually, in January 2017, DHS and IBC formed a joint contingency plan working group to assess options for addressing these challenges. A few months later, DHS decided that migrating the TRIO components from IBC to a DHS data center was the best option for its path forward. Through continued reliance on compensating controls and complex manual workarounds, DHS has been able to achieve a clean audit opinion on its financial statements. However, DHS will continue to face challenges to establishing effective internal controls over financial reporting because of the lack of effective financial systems and related processes. Fully incorporating best practices and lessons learned from prior commutation efforts would help DHS achieve its goal of modernizing financial systems which are critical to establishing sound internal controls that safeguard assets and ensure proper accountability as well as provide reliable, timely, and useful information to support day-to-day decision making and oversight. To support this subcommittee's oversight, GAO will continue monitoring the Department's financial management improvement efforts. Chairman Perry, Ranking Member Correa, and Members of the subcommittee, this concludes my statement. I will be pleased to respond to any questions that you have at this time. Thank you. [The prepared statement of Mr. Khan follows:] Prepared Statement of Asif A. Khan September 26, 2017 Chairman Perry, Ranking Member Correa, and Members of the subcommittee: I am pleased to be here today to discuss the findings from our report being released today on the Department of Homeland Security's (DHS) recent financial management system modernization efforts.\1\ Since DHS's creation in 2003, its ability to manage operations and reasonably assure effective financial management has been hampered by significant internal control and financial management system deficiencies. These deficiencies contributed to our decision to designate DHS's management functions, including financial management, as high-risk.\2\ --------------------------------------------------------------------------- \1\ GAO, DHS Financial Management: Better Use of Best Practices Could Help Manage System Modernization Project Risks, GAO-17-799 (Washington, DC: Sept. 26, 2017). \2\ GAO, High-Risk Series: Progress on Many High-Risk Areas, While Substantial Efforts Needed on Others, GAO-17-317 (Washington, DC: Feb. 15, 2017), and High-Risk Series: An Update, GAO-03-119 (Washington, DC: January 2003). In 2013, we changed the name of this high-risk area from ``Implementing and Transforming DHS'' to ``Strengthening DHS Management Functions'' to recognize DHS's progress in its implementation and transformation since its creation, as well as to focus on its remaining challenges in strengthening its management functions and integrating those functions across the Department. The ``Strengthening DHS Management Functions'' high-risk area includes challenges in acquisition, information technology, human capital, and financial management. --------------------------------------------------------------------------- In 2013, we reported on challenges related to DHS's previous attempts to implement a Department-wide integrated financial management system as well as specific actions and outcomes related to modernizing financial management systems that are critical to addressing high-risk issues.\3\ We also reported on the existence of certain material weaknesses that limited DHS's ability to process, store, and report financial data in a manner that ensures accuracy, confidentiality, integrity, and availability of data without substantial manual intervention.\4\ DHS subsequently adopted a decentralized approach to upgrade or replace legacy financial management systems and has been evaluating various options for modernizing its systems, including the use of shared service providers (SSP). As part of this effort, DHS initiated the TRIO project, which has focused on migrating the Domestic Nuclear Detection Office (DNDO), Transportation Security Administration (TSA), and U.S. Coast Guard (Coast Guard), or ``the TRIO components,'' to a modernized financial management system solution provided by the Department of the Interior's Interior Business Center (IBC). The TRIO project represents a key effort to address long-standing financial management system deficiencies, and DHS's efforts to effectively assess and manage risks associated with this project are essential to realizing its modernization goals. --------------------------------------------------------------------------- \3\ GAO, DHS Financial Management: Additional Efforts Needed to Resolve Deficiencies in Internal Controls and Financial Management Systems, GAO-13-561 (Washington, DC: Sept. 30, 2013). \4\ A material weakness is a deficiency, or a combination of deficiencies, in internal control over financial reporting such that there is a reasonable possibility that a material misstatement of the entity's financial statements will not be prevented, or detected and corrected, on a timely basis. A deficiency in internal control exists when the design or operation of a control does not allow management or employees, in the normal course of performing their assigned functions, to prevent, or detect and correct, misstatements on a timely basis. --------------------------------------------------------------------------- In 2013, the Office of Management and Budget (OMB) issued direction to agencies to consider Federal SSPs as part of their alternatives analysis.\5\ Subsequently, in May 2014, OMB and the Department of the Treasury (Treasury) designated IBC as one of four Federal SSPs for financial management to provide core accounting and other services to Federal agencies.\6\ In addition, Treasury's Office of Financial Innovation and Transformation's (FIT) responsibilities related to the governance and oversight of Federal SSPs were subsequently transferred to the Unified Shared Services Management office (USSM) after USSM was established in October 2015 as an entity within the General Services Administration. --------------------------------------------------------------------------- \5\ Office of Management and Budget, Improving Financial Systems Through Shared Services, OMB Memorandum M-13-08 (Washington, DC: Mar. 25, 2013). According to this memorandum, agencies must consider, as part of their alternatives analysis, the use of a Federal SSP, and OMB will consider funding the use of commercial SSPs as an appropriate solution if the agency's business case demonstrates that a commercial SSP can provide a better value to the Federal Government than a Federal solution. \6\ Office of Management and Budget and Department of the Treasury, Reducing Costs and Improving Efficiencies Through Federal Shared Service Providers for Financial Management (May 2, 2014), accessed August 3, 2017, https://www.treasury.gov/connect/blog/Pages/Shared- Service-Providers-for-Financial-Management.aspx. --------------------------------------------------------------------------- This statement summarizes our report that examined: (1) The extent to which DHS and the TRIO components followed best practices in analyzing alternatives, and the key factors, metrics, and processes used in their choice of a modernized financial management system; (2) the extent to which DHS managed the risks of using IBC for its TRIO project consistent with risk management best practices; and (3) the key factors and challenges that have impacted the TRIO project and DHS's plans for completing the remaining key priorities. To accomplish these objectives, we interviewed key officials and reviewed relevant documents. We compared the information we obtained to: (1) GAO-identified best practices for conducting an analysis of alternatives (AOA) process and related characteristics of a reliable, high-quality AOA process \7\ and (2) best practices published by the Software Engineering Institute (SEI) for preparing for risk management, identifying and analyzing risks, and mitigating identified risks.\8\ We also reviewed TRIO components' alternatives analyses documentation and evaluated their processes and related DHS guidance against the GAO- identified 22 best practices for conducting an AOA process. In addition, we reviewed DHS's and the TRIO components' risk management guidance and compared documentation and information obtained supporting their risk management efforts to best practices published by SEI. We also met with DHS, IBC, FIT, and USSM officials as well as OMB staff to obtain their perspectives on key factors and challenges that have impacted the TRIO project and DHS's plans for completing remaining priorities. The work on which this statement is based was performed in accordance with generally accepted Government auditing standards. More details on our scope and methodology can be found in appendix I of our report. --------------------------------------------------------------------------- \7\ GAO, Amphibious Combat Vehicle: Some Acquisition Activities Demonstrate Best Practices; Attainment of Amphibious Capability to be Determined, GAO-16-22 (Washington, DC: Oct. 28, 2015). That report updated the AOA best practices initially published in GAO, DOE, and NNSA Project Management: Analysis of Alternatives Could Be Improved by Incorporating Best Practices, GAO-15-37 (Washington, DC: Dec. 11, 2014). These AOA best practices are based on long-standing, fundamental tenets of sound decision making and economic analysis and were identified by compiling and reviewing commonly-mentioned AOA policies and guidance that are known to and have been used by Government and private-sector entities. App. II of our report provides additional details on GAO-identified AOA best practices and their relationship to the four characteristics of a reliable, high-quality AOA process; see GAO-17-799. \8\ Software Engineering Institute, Capability Maturity Model Integration (CMMI) for Acquisition, Version 1.3, CMU/SEI-2010-TR-032 (Hanscom Air Force Base, MA: November 2010). --------------------------------------------------------------------------- In brief, we found that DHS and the TRIO components did not fully follow best practices for conducting an AOA process and managing the risks of using IBC on the TRIO project, and we made two recommendations to address these concerns. DHS agreed with both recommendations and has taken action or has plans to implement them. In addition, we found that insufficient resources, complex requirements, and other challenges have impacted the TRIO project and contributed to a 2-year delay now expected in the implementation of Coast Guard's and TSA's modernized solution. In May 2017, DHS determined that migrating away from IBC to a DHS data center represented the best path forward. dhs did not always follow aoa best practices DNDO Substantially Met and Coast Guard and TSA Partially Met Best Practices for Conducting AOAs During 2012 and 2013, the TRIO components each completed an alternatives analysis to determine a preferred alternative for modernizing their financial management systems. Based on our assessment of these analyses, we found that DNDO substantially met the four characteristics that encompass the GAO-identified 22 best practices for conducting a reliable, high-quality AOA process, while the Coast Guard and TSA both substantially met one and partially met three of these four characteristics. For example, although TSA's alternatives analysis substantially met the ``credible'' characteristic, it partially met the ``well-documented'' characteristic, in part, because risk mitigation strategies, assumptions, and constraints associated with each alternative were not discussed in its analysis. Similarly, Coast Guard's alternatives analysis substantially met the ``comprehensive'' characteristic; however, it partially met the ``credible'' characteristic, in part, because there was no indication that it contained sensitivity analyses on the impact of changing assumptions on its overall costs or benefits analyses. Our assessment is summarized in table 1. TABLE 1: DHS TRIO COMPONENTS' ADHERENCE TO CHARACTERISTICS OF A RELIABLE, HIGH-QUALITY ANALYSIS OF ALTERNATIVES PROCESS ---------------------------------------------------------------------------------------------------------------- Overall GAO Assessment AOA Characteristic ------------------------------------------------------------------------------ Coast Guard TSA DNDO ---------------------------------------------------------------------------------------------------------------- Well-documented.................. Partially met............ Partially met........... Substantially met. Comprehensive.................... Substantially met........ Partially met........... Substantially met. Unbiased......................... Partially met............ Partially met........... Substantially met. Credible......................... Partially met............ Substantially met....... Substantially met. ---------------------------------------------------------------------------------------------------------------- Source: GAO assessment of TRIO component information. For additional information on the methodology used to assess TRIO components' adherence to characteristics of a reliable analysis of alternatives process, see GAO- 17-799/GAO-17-803T. Legend: Coast Guard = U.S. Coast Guard; DHS = Department of Homeland Security; DNDO = Domestic Nuclear Detection Office; TSA = Transportation Security Administration. Further, we found that DHS's guidance did not fully or substantially incorporate 5 of the GAO-identified 22 best practices. For example, although the guidance addressed risk management in general terms, it did not detail the need to document risk mitigation strategies for each alternative or address the need for an independent review--one of the most reliable means to validate an AOA process. Based on these analyses and other factors, the TRIO components determined that migrating to a Federal SSP represented the best alternative, and in 2014, DHS selected IBC as the Federal SSP for the project. However, because Coast Guard's and TSA's alternatives analyses did not fully or substantially reflect all of the characteristics noted above, we concluded that they are at increased risk that the alternative selected may not achieve mission needs. In our report, we made a recommendation for DHS to develop and implement effective processes and improve guidance to reasonably assure that future alternatives analyses fully follow AOA process best practices and reflect the four characteristics of a reliable, high-quality AOA process. In commenting on our report, DHS concurred with GAO's recommendation and stated that it has issued guidance and instructions that addressed the recommendation. As part of our recommendation follow-up process, we will review DHS's guidance and other relevant information. dhs met three and partially met four best practices for managing the risks of using ibc for the trio project Risk management best practices call for the identification of potential problems before they occur so that risk-handling activities can be planned throughout the life of the project to mitigate adverse impacts on achieving objectives. These best practices involve the following goals: Preparing for risk management, identifying and analyzing risks, and mitigating identified risks.\9\ Based on our evaluation, we found that DHS's processes did not fully follow best practices for managing project risks related to its use of IBC on the TRIO project. Specifically, we determined that DHS's processes met three of seven risk management best practices but partially met the remaining four best practices largely because its guidance did not sufficiently address these best practices. For example, although DHS created joint teams with IBC and provided additional resources to IBC to help address mitigation concerns, it did not always develop sufficiently detailed risk mitigation plans that included contingency plans for selected critical risks in the event that their impacts are realized. As a result, although IBC's capacity and experience for migrating large agencies the size of Coast Guard and TSA was identified as a risk in July 2014, a contingency plan working group to address this and other concerns was not established until January 2017. Table 2 summarizes the extent to which DHS followed these seven best practices for managing TRIO project risks. --------------------------------------------------------------------------- \9\ Software Engineering Institute, CMMI for Acquisition, Version 1.3. TABLE 2: DEPARTMENT OF HOMELAND SECURITY'S ADHERENCE TO BEST PRACTICES FOR MANAGING TRIO PROJECT RISKS ---------------------------------------------------------------------------------------------------------------- Best Practice Practice Statement GAO Assessment ---------------------------------------------------------------------------------------------------------------- Goal 1: Prepare for risk management: Preparation for risk management is conducted: Determine risk sources and Determine risk sources and categories.... Met. categories. Define risk parameters............. Define parameters used to analyze and Partially met. categorize risks and to control the risk management efforts. Establish a risk management Establish and maintain the strategy to be Met. strategy. used for risk management. Goal 2: Identify and analyze risks: Risks are identified and analyzed to determine their relative importance: Identify risks..................... Identify and document risks.............. Partially met. Evaluate, categorize, and Evaluate and categorize each identified Met. prioritize risks. risk using defined risk categories and parameters, and determine each risk's relative priority. Goal 3: Mitigate risks: Risks are handled and mitigated as appropriate to reduce adverse impacts on achieving objectives: Develop risk mitigation plans...... Develop a risk mitigation plan in Partially met. accordance with the risk management strategy. Implement risk mitigation plans.... Monitor the status of each risk Partially met. periodically and implement the risk mitigation plan as appropriate. ---------------------------------------------------------------------------------------------------------------- Source: Software Engineering Institute (best practices) and GAO analysis of DHS data. For additional information on the methodology used to assess DHS's adherence to risk management best practices, see GAO-17-799/GAO-17- 803T. Legend: DHS = Department of Homeland Security; Met = DHS-documented processes generally satisfied all elements of the specific practice; Partially met = DHS-documented processes generally satisfied some but not all elements of the specific practice. According to DHS officials, DHS relied heavily on IBC to manage risks associated with the TRIO project and, in particular, those for which IBC was assigned as the risk owner. They also acknowledged DHS's responsibility for overseeing IBC's TRIO project risk management efforts and described various actions taken to address growing concerns regarding IBC's efforts, such as offering DHS assistance to IBC's project management functions to help reduce exposure of underlying risks. Despite these efforts, DHS officials stated that challenges associated with the interagency agreement structure and terms of the performance work statement with IBC on the TRIO project limited DHS's visibility into IBC's overall cost, schedule, and performance controls and ability to oversee IBC's risk management efforts. Further, the issues associated with the best practices we assessed as partially met were largely attributable to limitations in DHS and TRIO project guidance and policies. We concluded that by not adopting important elements of risk management best practices into project guidance, DHS and the TRIO components increase the risk that potential problems would not be identified before they occur and that activities to mitigate adverse impacts would not be effectively planned and initiated. In our report, we made a recommendation for DHS to improve its Risk Management Planning Handbook and other relevant guidance for managing risks associated with financial management system modernization projects to fully incorporate risk management best practices. In commenting on our report, DHS concurred with GAO's recommendation and identified actions it plans to take to implement it. key factors and challenges impacting the trio project and dhs's path forward DHS, IBC, FIT, and USSM officials and OMB staff identified several key factors and challenges that have impacted the TRIO project, which we grouped into five broad categories: Project resources, project schedule, complex requirements, project costs, and project management and communications. Examples of the key factors and challenges that were identified for each of these categories include: Project resources.--Concerns about IBC's experience and its capacity to handle a modernization project involving agencies the size of Coast Guard and TSA were identified as significant risks in July 2014, prior to DHS and IBC's entering the TRIO project implementation phase in August 2014. According to DHS officials and documentation, IBC encountered Federal employee hiring challenges and was unable to ramp up and deploy the resources necessary to meet required deliverables and experienced significant turnover in key leadership and TRIO project positions over the course of the project. IBC officials acknowledged these challenges and that staff assigned early in the project lacked the experience and expertise necessary for managing large-scale projects and, as a result, many of the risks initially identified were not effectively addressed. Project schedule.--Migrating the TRIO components to IBC within original time frames was a significant challenge given the overall magnitude and complexity of the TRIO project. DHS identified delays in stabilizing the production environment after DNDO's migration to IBC and in meeting proposed baseline schedules for implementing Coast Guard and TSA on the modernized solution. Complex requirements.--DHS, IBC, FIT, and USSM officials acknowledged the overall complexity of the TRIO project and that the lack of a detailed understanding of the components' requirements earlier in the project affected IBC and DHS's ability to satisfy the requirements as planned. USSM and FIT officials told us that under the shared services model, the approach for onboarding new customers usually involves migrating to a proven configuration of a solution that is already being used by the provider's existing customers. However, rather than taking this approach, DHS and IBC agreed to implement a more recent version of Oracle Federal Financial software (version 12.2) with integrated contract life cycle and project modules, increasing the complexity of TRIO project requirements. A FIT official told us that the functionality of this more recent version of software is very different than that of the version IBC's existing customers used and that IBC did not have the needed Government personnel with knowledge and experience associated with it. Project costs.--Estimated costs of the TRIO project significantly increased because of schedule delays, unanticipated complexities, and other challenges. According to a January 2017 summary prepared by DHS, estimated IBC-related TRIO project implementation costs through fiscal year 2017 increased by approximately $42.8 million (54 percent) from the $79.2 million provided in the original August 2014 interagency agreement with IBC, in part, to address challenges affecting the project. Project management and communication.--DHS officials expressed concerns regarding the effectiveness of IBC's project management efforts, including cost, schedule, and change management. They also stated that DHS provided significant time and resources to make up for fundamental project management activities that were under IBC's control and not performed. They also acknowledged challenges in DHS's project management and communication efforts and identified lessons learned to help improve future efforts, such as being more prepared for organizational changes and centralizing program management functions to help reduce duplicate efforts across components. According to USSM officials, the TRIO project team focused an unbalanced portion of its efforts on the delivery of technology at the expense of organizational change management, communication management, and other project management areas. An OMB staff member concurred with the lessons learned identified by DHS and noted the importance of DHS having well- defined requirements for the project and better coordination to achieve the desired outcomes. These challenges contributed to a 2-year delay now expected in the implementation of Coast Guard's and TSA's modernized solution. To help address them, DHS and IBC established review teams and have taken other steps to assess potential mitigating steps. For example, in January 2017, DHS and IBC established a joint contingency plan working group (CPWG) to assess viable options for addressing stakeholder concerns and key TRIO priorities moving forward. In February 2017, DHS and IBC presented two options for addressing these concerns, and in April 2017, the CPWG recommended moving away from IBC to a commercial service provider as the best course of action to complete TRIO project implementation. In May 2017, DHS determined that this option was not viable and that migrating the solution from IBC to a DHS data center represented the best option and initiated discovery efforts to further assess this as its path forward for the TRIO project. As of August 2017, results of these efforts were under review by DHS leadership. As the path forward is still evolving, it is too early to determine the extent to which these challenges, and DHS's efforts to effectively address them, will impact DHS's ability to achieve TRIO project goals. In commenting on our report, DHS stated that it remains committed to its financial system modernization program and that it will continue to apply sound program and risk management best practices to achieve its modernization goals. Chairman Perry, Ranking Member Correa, and Members of the subcommittee, this concludes my statement. I would be pleased to respond to any questions you may have at this time. Mr. Perry. The Chair thanks the gentleman. The Chair now recognizes himself for 5 minutes for questioning. I guess I will start with you, Mr. Fulghum. I don't have to say, you know, what, $50 million the first time, $124 million this time. I appreciate you saying the buck stops with you, and I understand to a certain extent that maybe this wasn't your idea how this should be with the shared services model, but you were told that is what you were going to do and it was your mission when you moved out. But you must understand, and I am sure you do, that we can't accept that loss of money, that expenditure, without having a viable product all these years later now. One of your other testifiers there talked about the deliverables, and I will ask her about that because I think she said there is some value that has been retained here. But to me, you served your country in uniform, and I am sure you are well familiar with these processes, but any kind of project, you know, whether it is attacking the enemy or whether it is cleaning the hangar, you have got some milestones, right? You know you have got to get past some things and evaluate your circumstances, see where you are and see if you are on track. It doesn't seem to me, and I might be wrong, so I will ask Ms. Singer at some point, too, but from your standpoint when you signed this agreement, when you agreed to this whole prospect, were there milestones in place? If there were, briefly, what were they? If there were milestones to make sure that you stayed on track, it seems like at this point that we have failed to meet them or recognize them or we just blew past them. What the heck is going on here? Mr. Fulghum. So first of all, what I would say is, and to Michele's point, we do have a system that is functioning and working and we can talk about that. But as far as the milestones go, we had an integrated schedule and we sat down routinely and looked at that schedule. Showing that schedule was green, green, green in around the May time frame of 2016, it was turned to yellow and red. At that point, I called the folks together, including IBC, her former colleague, and said, what the heck is going on? We stopped the project at that point. We sat down with them and said, what can we do to course correct? We put some things in place in terms of incremental releases, more frequent check- ins, increased oversight and some other things and also provided some resources to IBC. We were able to DNDO up and running. Subsequently to that, we began on TSA's effort and again the schedule started to go south. That's about the time Michele showed up, we sat down again because of their inability to adequately resource themselves as well as what I would say is a misunderstanding of requirements of a large, complex Federal agency that would be a standardized solution for that type of agency, we made the decision to part ways. But we do have a solution that is functioning, is making payments, is writing contracts, is producing financial statements and is the foundation of the system moving forward, which is why we made the decision to continue. Mr. Perry. You just elaborated on the two times that you stopped it. Mr. Fulghum. So, yes, sir. We stopped it before we ultimately got DNDO up and running. Then along with IBC we made the decision to end the relationship, as she said, in January 2017. Mr. Perry. Was that, the ending of the relationship, was that envisioned, so to speak, or at least some tenet of what would precipitate that in the original agreement? So say this is what we want to get accomplished, these are our milestones, if you can't get it done we are going to be done because of this, this, and this. Was that envisioned at the genesis of the agreement, or was that never considered? Mr. Fulghum. It wasn't in the agreement. Mr. Perry. So if it is not in the agreement, it doesn't seem like we are going to be very efficient. Now, I am going to talk to Ms. Singer here for a moment. I guess my point to that is that, yeah, while you agreed to part ways, I am not sure we got the best value out of the deal. If somebody, you know, if somebody is working on my house, and I have an agreement, and I am going to pay you $50,000 to do X work on the house, and I know that I am going to terminate it at some point if you don't perform, I am going to want some of my money back or I am going to want, you know, X amount of work done. But that all has to be determined up front, you can't wait until you are in the middle of the construction to figure that out. It is too late, feelings are hurt, so on and so forth. Really quickly, and maybe we will do a second round here, Ms. Singer, you said there were value of assets to be transferred. What is the value? So we spent $124 million on this round. What do you consider the value of the assets to be? Ms. Singer. The valuable assets I speak of is Oracle Federal Financial 12.2, the system that was developed, coded, tested, and implemented for DNDO. In the next quarter of this fiscal year, we will have released 3.0 which will include 80 percent of the functionality needed for TSA and Coast Guard. So at this point, the operational system that DNDO is using every day will be available for DHS to manage in one of their data centers and bring live TSA and Coast Guard in the coming years. Mr. Perry. So we are 60 percent over budget. I think the original estimate was $70-some million, we are $124 million. What do you assess the value to be? Because we have got DNDO up, right? We have got a shell or a structure or a foundation for TSA, we have got nothing for Coast Guard. So we have paid 60 percent more, is that the value of it? I mean, are you saying that was worth $124 million? Did we just miss the estimate? Ms. Singer. I absolutely believe the estimate was missed. Now, my assessment is based on the record assessment of historical agreements back and forth, the best I could determine in the last 18 months that I have been managing this. I also think it highlights IBC at the time did not understand the complexity and the needs of an agency like DHS. They were vastly larger than anything we had undertaken. Our 17 other agencies that reside on Oracle Federal Financial 12.1 use a common solution and we are the No. 1-rated financial services provider in customer service to those 17 agencies. So the underestimation of the magnitude of the effort on both sides was real. But as the director of the shared service provider looking back over the record, I am extremely disappointed that I had predecessors who did not recognize that at the time and exercise more discipline both internally in their own organization in IBC as well as as a provider with DHS to help prevent some of the delays and cost overruns. Mr. Perry. All right, thank you. My time is long expired. The Chair now recognizes Ranking Member Correa. Mr. Correa. Thank you, Mr. Chairman. First of all, to the witnesses, thank you very much for your testimony. Mr. Fulghum, a quick question. Given all of the challenges that we are talking about here, cyber attacks, are we more vulnerable, less vulnerable? Where are we with that, protecting our data from the bad guys? Mr. Fulghum. I mean, what I would tell you is I call it a full-contact sport and we have to be diligent 24/7. We have real threats out there each and every day. Mr. Correa. Are we more vulnerable than usual or have we taken care of business? Mr. Fulghum. I think we have done everything we can to protect ourselves. Mr. Correa. Thank you very much. Ms. Singer, very quickly, we talked about the Oracle system. The Chairman talked about ownership, what we got out of our investment. Oracle 3.0, is that what you said? Who owns that? Do we own that or does Oracle? Is that something proprietary to Oracle? When we need to, you know, work it, modify it, does Oracle come in and do it or our in-house folks do it? Ms. Singer. It can be a combination. We have in-house folks who have some skills in modifying the system. But generally, we do work with industry. It is always a public/private. Mr. Correa. How is the contract written? Is it proprietary or non-proprietary? Ms. Singer. It is not proprietary. The underlying system is proprietary to Oracle, the out-of-the-box system. However, when it is coded and additional functionality is added, that is generally by another---- Mr. Correa. So whatever asset we have, we can possibly use that since we own it in other areas of government. Ms. Singer. Absolutely. Mr. Correa. Given all the lessons learned. Ms. Singer. Absolutely, this asset---- Mr. Correa. So possibly we do have something of value there that we are getting out of taxpayer dollars. If I can now move to Ms. Angerman. USSM's role in partnership between DHS and the Interior Business Center, IBC, how engaged with USSM during the discovery phase in the implementation of the IBC solution? Ms. Angerman. Thank you for your question. USSM was set up in 2015 and so the project was very much in flight when USSM was created. We, however, engaged with the program on a fairly regular basis to share what we knew to be best practices and lessons learned on how a shared service can be best implemented. Mr. Correa. Now, the lessons learned that were articulated by IBC, DHS, both thought it was clear that DNDO was failing the migration. The TSA migration would also be delayed. So Coast Guard, where were we with that migration? Ms. Angerman. I think that question may be best answered by Mr. Fulghum who can provide the status of that program. Mr. Correa. Mr. Fulghum. Mr. Fulghum. So currently, we are in the final stages of planning to transition from IBC to our own data center. Right now, our notional schedule says, based on funding and some other things, that we believe we can have it up and running in fiscal year 2021. Mr. Correa. Another question, Ms. Angerman. After all these attempts to standardize into a single platform, are we going to centralize or decentralize? What are we doing right now in terms of the philosophy? I find that sometimes we take a shot at an effort and sometimes we find that maybe there are shortcomings, so then we take a policy swing from centralization to decentralization. How would you characterize right now the status in terms of implementing solutions to these problems? Ms. Angerman. I would characterize right now as taking a step back and really looking at what we have learned today, both from this program and from others that have attempted these kinds of transformational efforts. I think we have two options for moving forward. One is we step back and we go back to a decentralized model and we let every agency build their own finance systems and H.R. systems and then we figure out how to keep those modern and funded. Or we agree that we want to consolidate that IT and we want to mitigate that risk for taxpayers and we want to get scale for the Government. Mr. Correa. I am running out of time, so let me quickly--we just talked about Oracle, we have got some value there. So could that be used in the decentralization process? Ms. Angerman. We don't know yet. The truth is that we need to sit down as a Government and include all of the agencies in a discussion about what requirements we actually have for future financial management systems, inclusive of large and small agencies. We need to be able to articulate that as a Government and speak with one voice as what we need, and then we will be able to assess solutions, both that are in Government today and potentially new solutions from industry that can help us satisfy financial management needs holistically. Mr. Correa. Mr. Chair, I yield. Mr. Perry. The Chair thanks the gentleman. The Chair now recognizes Mr. Higgins from Louisiana. Mr. Higgins. Thank you, Mr. Chairman. Colonel Fulghum, thank you for your service of 28 years, sir. Your resume is very, very impressive. As an old soldier, I would imagine that looking at your resume if you can't get this thing done, I can't imagine who could. So although I recognize you as a gentleman of great accomplishment, and I also recognize in your spirit, sir, and read within your statements great frustrations of what has unfolded and transpired over the last years. Would that be an accurate assessment? Mr. Fulghum. I share the committee's frustration. Mr. Higgins. OK. Ms. Singer, in your opening statement, you stated that to achieve strong adoption of standard business processes, customer agencies must evaluate their complex business processes with a willingness to differentiate and potentially eliminate disparate processes that are not legally mandated. That was many syllables in one sentence. But to me, that means eliminate unnecessary duplicative policies and procedures. The GAO report cites IBC officials describing DHS's approach to project management often resulted in duplicated meetings and lengthy decision-making process involving several officials and multiple review and approval processes. Colonel, did you have the authority to eliminate during the course? I realize you are dealing with multiple bureaucracies and perhaps what would be recognized by the citizens that we serve as the very worst manifestation of heavy bureaucracy in the Federal Government, and you were in charge of a large project. Did you have the authority to eliminate some of these unnecessary lengthy meetings and multiple reviews and approval processes? Mr. Fulghum. Yes, sir, and we did. Mr. Higgins. Did you find during the course of your efforts to make this thing work, did you find resistance out of the Executive branch or out of any of the alphabet branches that you were working with? Has that resistance dissipated over the course of the last 6 months? Mr. Fulghum. I think there was a persistence to head toward the Federal shared services model under the previous administration. I have seen an increased adaptability to the model we are going to under this administration. Mr. Higgins. Thank you, sir. I would like to ask, I believe, you, Colonel, and Ms. Singer, any member of the panel that could answer this, were any private models, best-practice models from private endeavors, large, massive entities like Walmart or Home Depot, Lowe's, they have gone through modernization processes through the course of their existence, were any private models used or brought in to study their best practices? Mr. Fulghum. Yes, sir. During our analysis of alternatives, we looked at the private sector. In addition to that, we had an independent look at what the private sector is currently doing. Mr. Higgins. Did you find that--I am honing in on something here. Mr. Fulghum. Yes, sir. Mr. Higgins. The Chairman clearly pointed out that private businesses have to modernize all the time. We do it with the most efficient means by which moving forward that we can possibly find and determine. I am asking, is the bureaucracy of the agencies that you are working with so thick that the common best practices found in private industry toward modernization just doesn't quite work? Mr. Fulghum. I would say it is a challenge working in the bureaucracy. That said, our independent look showed that large corporations also failed in terms of modernizing their systems, so they didn't always get it right either. Mr. Higgins. Can you give us an example of that? I am sorry, Mr. Chairman, I am over my time. Mr. Fulghum. I don't have a specific example of a corporation, but we can certainly provide the committee with the results of our analysis. Mr. Higgins. That would be interesting to review. Thank you for your answer and thank you for your service, sir. Mr. Chairman, I yield. Mr. Perry. The Chair thanks the gentleman. The Chair recognizes the gentlelady from California, Ms. Barragan. Ms. Barragan. Thank you, Mr. Chairman. Ms. Angerman, do you know what processes and criteria DHS used to select IBC as its SSP for financial management? Ms. Angerman. Thank you for your question. I know that the process that they went through at DHS to select IBC was largely driven by the memorandum M13-08 to direct agencies to a shared service provider. Ms. Barragan. Do you know if DHS and IBC if they did at all communicate to ensure whether the systems were interoperable such that IBC's system could fully integrate DHS's system? Ms. Angerman. I am aware that during the discovery process they went into some depth to discuss what the integration needs would be with other systems that would remain at DHS. Ms. Barragan. Who was responsible for identifying and reconciling discrepancies between IBC's systems capabilities and DHS's system requirements? Ms. Angerman. That is the purpose of the discovery process, which is that they sit down and they talk about the way that the process exists today at the customer agency, how the process works at the shared service provider, and they try to close those gaps and figure out how they will change their processes to adapt to the solution. Ms. Barragan. Thank you. Mr. Fulghum, you talked a little bit about at some point you realized something was wrong and you all sat down to talk about it. How far after everything started did you realize that things were going wrong? Mr. Fulghum. If I recall correctly, it was about 8 months in. Ms. Barragan. When we were 8 months in, did you realize that the Government was going to spend millions more than what was initially projected? Mr. Fulghum. That was a part of when we paused the program. It clearly looked like we were off schedule and that we were going to have to expend additional resources, yes. But that is when we went through the replanning effort to see if we could turn the program around, which, again, we did deliver DNDO on time. Not on budget, but on time. Ms. Barragan. Then how much longer after that did you all decide that this wasn't going to work and you terminated? Mr. Fulghum. If I remember right, we began those discussions the following April and eventually determined that we wouldn't be able to do it. Ms. Barragan. So pretty early on. Ms. Angerman, how do inadequate financial systems affect the operational capacity of DHS? Ms. Angerman. Inadequate financial systems insomuch that they are legacy systems that need to be modernized introduce risk to being able to have access to data in a timely fashion and to be able to have consistent data across the Department to be able to make key decisions. Ms. Barragan. So is this system used to try to determine if projects are on track cost-wise? Mr. Fulghum. So this system provides financial information that can inform future decisions around acquisitions or other things if that is what you are asking. Ms. Barragan. Well, I am just thinking, at a time when the administration is attempting to divert resources to projects like the border wall, I am curious to know if Congress and DHS management will have access to a full financial picture of the Department and where they are in these projects. Mr. Fulghum. So the Department has consolidated financial reporting today. We use business intelligence to get it. We have financial information that we produce every month from a consolidated nature, so, yes, we have a complete picture of the Department's finances. Ms. Barragan. OK. I will yield back. Mr. Perry. The Chair thanks the gentlelady. The Chair recognizes the gentleman from Texas, Mr. Ratcliffe. Mr. Ratcliffe. Thank you, Mr. Chairman. Thank all the witnesses for being here today. We spend a lot of time, it seems, talking about what went wrong when you realized things went wrong, basically how we got here and the different initiatives ending in wasting $56 million, I think, and then $124 million. So having said all that, I guess what I really want to know and what I haven't heard yet is, why should Congress have any assurance that the next attempt will be successful, especially given how aggressive the schedule appears to be? I want to start with you, Mr. Fulghum, and give you a chance to answer that. Mr. Fulghum. So first of all, again, we do have the foundation of a solution that works. We know a lot more than we knew 2 years ago. Mr. Ratcliffe. Well, let me stop you there. Mr. Fulghum. Yes, sir. Mr. Ratcliffe. Because you say that, but I heard the answers, some of the responses from Ms. Singer and Ms. Angerman, and what I heard was talking about lessons learned from where we were. Ms. Angerman, you said, well, we need to step back and decide whether or not to be decentralized and then you started and you weren't able to finish that answer. Ms. Singer, you said, you know, we didn't understand the need of DHS. That is a lot of don't knows and don't understands. That doesn't inspire a whole lot of confidence, so that is the context of my question. Mr. Fulghum. OK. So what I would say is they didn't know and didn't understand. They have a much better appreciation today of our requirements. The solution meets 75 percent of our requirements. As Ms. Singer said, when 3.0 comes in October, we will be at over 80 percent. That is how the system was originally designed. DNDO was to be a pilot with the basic foundation for an integrated solution, add TSA's functionality and then add the Coast Guard's. So that is why I say that we have a system that works to build on. Mr. Ratcliffe. Thank you, Mr. Fulghum. Ms. Singer. Ms. Angerman, I will give you a chance to sort- of weigh in and give your perspective on that as well. But I want to ask this question in connection with giving your answer, and that is, if there are lessons learned and there is a foundation for a solution going forward, what is the biggest risk that DHS still has to identify or mitigate at this point with respect to financial management and reporting systems? Ms. Singer. Thank you for that question. I think the biggest risk for any large, complex, federated agency--and the federated part is important because its component parts are vital, unique, or brought in to be part of the whole with their disparate systems and processes that they have brought with them--the biggest risk will always be finding a baseline that as many of those component parts can live with as possible and meet their vital and important business needs as well as be auditable and of sound financial organization. I think no one is better situated than DHS headquarters to understand that need. I see no one more committed than Mr. Fulghum, his leadership team to bring discipline to that effort. But it is an enormous challenge. The Department of the Interior went through it and that is an agency more than 150 years old, smaller, and less complex, but still struggled mightily in implementing one consolidated financial system. I lived through that and understood the complexities and that will always be the largest challenge. It will leave the question whether a large, complex, federated agency like DHS or others in the Federal Government belong with one of the existing shared service providers or whether they are best-suited with help from industry and guidance from best practices to consolidate on their own. I think the platform they have now provides that opportunity. Mr. Ratcliffe. Ms. Angerman, I will give you a chance to weigh in on those points and questions. Ms. Angerman. Thank you. I would largely agree with Ms. Singer's comments. I would say that DHS has recognized that this will continue to be a challenge and they have created a joint program management office at headquarters and staffed it appropriately so that they are prepared to address challenges going forward. I would also say that this is an important lesson learned for the Government at large. So my comments about stepping back is that when we think about the strategy for shared services at large for the Government and what we are going to do going forward, this is really important data for us. In addition to some of the best practices, we have learned by talking to Fortune 500 companies who have had the same challenges when they tell us this is equally as hard for them to do, but where it has also been a proven best practice. All of that is really helping us to move forward with a better strategy. Mr. Ratcliffe. Thank you. My time is expired. I yield back. Mr. Perry. The Chair thanks the gentleman from Texas. The Chair recognizes the gentleman from Kansas, Mr. Estes. Mr. Estes. Thank you, Mr. Chair. In my prior life before I ran for public office, I did some of this work, so I have got a little bit of understanding of some of the problems that you have run into in a complex project like that. I want to talk a little bit more about where are we going to go from here, I mean, what is the path forward, which is part of what we talked about in some of the notes here. So basically, we are pulling this into an operation by DHS and kind-of moving away from the shared services concept and moving forward. That is the plan right now with the use of the software? Mr. Fulghum. So what I would characterize it is we are moving from DOI's environment into DHS's and it will be a private cloud offering. We still have a shared service, just an internal shared service provider. So the Coast Guard is providing the accounting support today for those three entities. We will have one integrator contractor that will provide those platform services for all three components; it is just we are no longer asking for services from another Federal agency. Mr. Estes. OK, that makes sense to some degree from a strategy, I guess. But there is probably another question for another hearing in terms of talking about where we go with the shared services model at the total Federal level, but not to sidetrack from that. Ms. Singer, one of the things you talked about was that we were 80 percent of the way with Coast Guard and with TSA, and I guess expectations are first quarter of 2018 we would have the TSA software up and available. Is that 80 percent functioning and provides 80 percent of the functionality that we wanted, or is it 80 percent of the way to being developed and programmed and tested? Ms. Singer. I believe what we mean by that is delivering 80 percent of the desired functionality. There are interfaces to be developed and a couple of key components that DHS must decide whether or not they want to develop and implement that they are best-situated to make that decision. For a shared service provider, like the Interior Business Center, those would be developments that I could not offer or provide to any other agency. They are very specific to DHS. That is why it doesn't fit within this particular shared service model, but that does not mean that they are not necessary or vital to DHS to be able to carry out their important mission. It is just that last 20 percent of requirements will be for DHS to further develop and implement. But the full system is operating. For that functionality that they would like to see come on-board soon, there also exists workarounds. It allows the work to be done, but may be not in exactly the way they would like to see it. Mr. Estes. So is the Oracle software platform going to be used by the Coast Guard to provide that support for TSA? Mr. Fulghum. Yes, sir, same platform. I would describe it a little bit differently than Michele. DNDO is a basic 300-person operation. TSA has got about 60,000 employees, but their basic operation is fairly straightforward. The Coast Guard has a much more complex organizational structure and business practice than TSA. So when we get the 3.0 for TSA it will work for TSA. We need the last 20 percent to add some increased functionality because of the complexity of the Coast Guard. Mr. Estes. So going back to TSA and whether we are up and running, I mean, how are we going to use that for TSA? So what is the functionality that is going to be used for TSA come first quarter of 2018 if we are not using the software or going live with the software for them? Mr. Fulghum. So today we will stay on the system that we are on and continue to stay on the legacy system until we are ready to migrate into the new solution. Mr. Estes. OK. One final question that I know may run longer than the time I have in terms of the answers. How much have we modified this software so that it makes upgrades difficult and complex and maybe even impact the ability to use future upgrades provided by the vendor in the future? Mr. Fulghum. Well, I will start and Michele probably has more expertise than I do, but the out-of-the-box commercial software we are not modifying. What we are describing is, and it provides some integrated solution in terms of procurement, what we are talking about is other interfaces for property, logistics management and those type of things that interface with the solution. But the software itself we are not modifying. Ms. Singer. There are significant additional functionality interfaces, as Mr. Fulghum noted, to the extent, I mean, if you looked at lines of code that have been written or modifications, what we call the requirements traceability matrix will show a significant number of changes in order to meet the DHS business needs. I do believe there are methods to ensure upgrades, enhanced security, and continued security of the system. It is not modified outside the realm of what can be continuously secured and updated. Mr. Estes. Thank you. I am out of time. I yield back. Mr. Perry. The Chair thanks the gentlemen. We will go for a second round as long as we can. Ms. Angerman, it is my understanding, so I just want to make sure I am correct here, that your agency provides input and advice on best practices related to design and execution. Is that generally speaking correct? Ms. Angerman. Yes, that is correct, sir. Mr. Perry. OK. So, Mr. Khan, in your testimony, you said that, and I want to make sure once again I am correct, that, in your opinion, based on your investigation, that the agency didn't follow best practices. Is that correct? Mr. Khan. Best practices was in terms of the alternatives analysis. We found that DNDO followed all the best practices. These are industry best practices so, I mean, they are well- known in the industry. However, TSA and Coast Guard did not follow all elements of the best practices to result in a high- quality, reliable alternatives analysis. Mr. Perry. Were you able to determine why they wouldn't? I mean, has that question been asked or do I need to ask Mr. Fulghum? You just determined they didn't? Mr. Khan. Right. We didn't ask why, we just looked at the end results of their analysis that was done some time before we started our audit. Mr. Perry. OK. Ms. Angerman, do you agree with that? Do you know if they, in your opinion, if they followed these best practices? I mean, you are the adviser on these things. Ms. Angerman. I think there were always--we identified and observed opportunities to improve in the planning process and the change management process in the integrated project management between the two agencies and that they investigated through their alternatives analysis the options that were available to them at the time. Mr. Perry. OK. Mr. Fulghum, can you comment? I mean, you know, if these are well-known, widely-ascribed-to best practices, is there some reason why they can't be followed or just recalcitrance or, you know, institutional bias for the organization, this is how we do things, this is how we have always done them, and we are not going to change, and we are going to resist? What is your take on this? Mr. Fulghum. No, sir. We will follow the best practices that were identified. I think what GAO found was that, in the case of DNDO, they had an independent contractor do their alternatives analysis. While the Coast Guard and TSA went through an extensive review process, they didn't have that independent contractor perform the analysis, I think is where we primarily fell short. Mr. Perry. So are you saying that the Coast Guard and TSA should have had the independent contractor as---- Mr. Fulghum. I think a best practice would have been to have an independent review of that analysis. What I am saying, though, is that there was an extensive review of that analysis of alternatives by a variety of folks, including Treasury FIT. Mr. Perry. OK. In your testimony, Colonel, you said that it would be restructured for clearer accountability moving forward. Can you tell me what the difference in moving forward regarding accountability? Can you also describe if the private sector, so to speak, is going to be involved either more or to what extent moving forward? Mr. Fulghum. OK. Well, I will start with the accountability and a clear line of accountability. What I was referring to is, when we originally set up the structure we had three program offices with someone sitting over them and they were four people with, what I would say, no one really in charge. So when we stopped to pause the program, one of the things that I did was I asked the now-acting CFO to go take a hard look at ourselves to see what is it that we can do better. Out of that came a joint program office where there is one person, she is sitting right behind me, who is accountable and in charge. So from that perspective, I completely agree that we were fragmented in terms of our communication. I believe we have fixed that now. As far as the private sector, we are going, as you know, we have a draft, an RFP out asking for what I call a systems integrator. That will be a performance-based contract with clear visibility into both cost and scheduling. Mr. Perry. Excellent. Do you want to announce the gentlelady-behind-you's name who is going to be accountable so that when the next time we get together maybe she will be sitting on the dais with you? Or maybe we won't have to get together, which would be even better. Mr. Fulghum. I don't expect us to get together on this topic. But ultimately, as I said at the start, I am the one that is responsible and accountable. Mr. Perry. All right. Mr. Fulghum, we are going to hold you to that. We appreciate that. With that, I will conclude my questioning and recognize the Ranking Member, Mr. Correa. Mr. Correa. Thank you, Mr. Chair. Just as I am listening to your answers, I learn more and more and I have even more and more questions. But right now, we are not talking about all of DHS, we are just talking about certain portions of DHS. Correct? Mr. Fulghum. That is correct. Mr. Correa. OK. So are we looking at eventually getting the bugs out of this process and then integrating the remainder of the DHS departments? Mr. Fulghum. So our plan would be moving forward, again, and a lot of this is dependent on funding, which, by the way, I completely understand, given where we are today, we have ICE with services themselves and four other customers and then we have FEMA left to go. So based on this model and looking to standardize and reduce the footprint, we would expect to repeat this model with both ICE and FEMA. The rest of DHS is operating on a modernized system, CBP, Secret Service, and FLETC. Mr. Correa. So I guess, given the words you have just used, we are going to be using the best lessons learned here to try to move forward to essentially address the other departments as well, ICE and FEMA? Mr. Fulghum. Right, again using that internal shared services approach. Yes, sir. Mr. Correa. Let me say that, again, just based on my State legislative experience, you have got a challenge on your hands, we have a challenge on our hands. But I think that all of you here working together, coordinating with this committee and subcommittee, can make sure we coordinate and know what is going on so that we can best prepare for these surprises and we don't have to be here in a quarter or thereafter and have to answer tough questions, but rather try to make sure that there aren't any surprises as we move ahead. There will be. Again, as I listen to your testimony, I am getting these nightmares of what we went through in the State of California as a decentralization, not centralized, private, public, nothing really ended up being the right answer. But rather, I think we have to look at the process to make sure that we are managing the whole process and its implementation and adapting, I guess, to the circumstance as we move forward. Mr. Chair, I yield the remainder of my time. Mr. Perry. The Chair thanks the gentleman. The Chair recognizes the gentleman from Louisiana, Mr. Higgins. Mr. Higgins. Mr. Chairman, I have more of a statement than a question. I would just like to commend this panel for your candid and courageous answers. This is a level of complexity to coordinate for modernization, an endeavor that was envisioned years ago, and to sit before a Congressional subcommittee like this and confess that lessons were learned and changes were made. I was particularly struck by Ms. Singer's honesty when she stated that the estimate was missed by her predecessors regarding the $70 million price tag that has evolved into a $124 million price tag, and we are not done yet. So, Mr. Chairman, I think every now and then we have some very squared-away panelists and this was one of those days. So we thank you all for your continued efforts. I yield the balance of my time. Mr. Perry. The Chair thanks the gentleman and the use of the terminology ``squared-away,'' which hits close to home to me, and now recognizes Mr. Estes of Kansas. Mr. Estes. I guess my first question deals with, what is the time frame? I know we have talked a little bit about having to take a step back and say what are we doing, when are we doing it, how are we doing it, but, you know, what is the time frame to come up with a plan, particularly for DNDO and Coast Guard and TSA from a cost standpoint and what to do, when? Mr. Fulghum. So we are finalizing our plan to transition from IBC's data center to ours. Once we have that plan finalized, we will go out on the street for an integration contractor, which we expect to award by the end of October. By May, I believe we will have the system transitioned, we will have DNDO up and running by the first quarter of fiscal year 2019, and then we will have TSA up and running the first quarter of 2020. The expectation is the Coast Guard the first quarter of 2021. Mr. Estes. OK. What is the expectations now for particularly fiscal year 2018, but maybe even future years we don't know yet, but for costs in fiscal year 2018 in terms of doing this work? Is that already laid out in the budget, or did the change in direction cause---- Mr. Fulghum. So we believe the money we have asked for in the President's budget in fiscal year 2018 is sufficient to do what we need to do in fiscal year 2018. Mr. Estes. OK. So we talked a little bit about lessons learned. Granted, there was a lot more complexity from a standpoint of moving into a shared services model and, you know, as you mentioned, having different groups or different individuals from different groups trying to work together, but some of those things were pretty basic, I mean, in terms of the right resources and tracking the schedule and communication. So what is our plan to do in the future, going back to the question that was raised earlier about the confidence level that this next effort is going to succeed completely? Mr. Fulghum. So what I would say is I think we have learned lessons on the amount of testing we do, so we are going to do more testing than was done previously before Michele got there. In addition to that, the contract structure that her predecessors put in place were complex, the relationships were complex. We have a much more simplified approach. Then I go back to that joint program office, one voice, one office that is running the entire project. Those things combined with the fact that because of Michele's hard work and her team's hard work we have got a solution that we can use that will be the foundation for TSA and the Coast Guard. Mr. Estes. OK, thank you. I yield back. Mr. Perry. I think that votes have been called or will be momentarily, just for Members. To all the panelists, thank you very much for coming. I suspect in this regard we won't see Ms. Singer or Ms. Angerman again on this subject. However, Mr. Fulghum, I do expect to see you again and hopefully not on this subject. But if Mr. Khan and his investigations and requirements determines that we need to sit down again we will. We hope to think that we haven't wasted upward of over $50 million on the first round and $124 million on the second. We appreciate that there are some deliverables that Ms. Singer has alluded to and, Mr. Fulghum, you have validated. But still, it is too much. It is our job, all of us as citizens, to make sure that our taxpayers are getting the most out of every dollar and every cent. So that is our duty as well as the mission, the other mission which is to complete these tasks. Right? So to that end, we are going to keep an eye on things and hopefully we will have better success in the future. Maybe you can come in here and tell us that that money was well-spent and since then we have got all the other agencies, including FEMA, involved and included in this and we have one model that we can pull reports from and be integrated. That would be what I think we would hope for. So we appreciate your time today. The Chair thanks the witnesses for their valuable testimony and the Members for their questions. Members may have some additional questions for the witnesses and we ask you, the witnesses, to respond to those in writing. Pursuant to committee rule VII(D), the hearing record will remain open for 10 days. Without objection, the subcommittee stands adjourned. [Whereupon, at 3:18 p.m., the subcommittee was adjourned.] A P P E N D I X ---------- Questions From Chairman Scott Perry for Chip Fulghum Question 1. How will DHS improve its decision-making processes and communications with the new system integrator? What accountability mechanisms will exist with the upcoming procurement that did not exist with the Interagency Agreement with IBC? Answer. Per the lessons learned from the effort to move the United States Coast Guard (USCG), the Transportation Security Administration (TSA), and the Domestic Nuclear Detection Office (DNDO) to the Department of the Interior's Interior Business Center (IBC), a Federal shared service provider, changes have been made to improve the DHS decision-making process. The implementation approach has changed from individual component projects to a single initiative, which will streamline decision making. The new joint Program Management Office (JPMO) now provides centralized program governance, which differs from our effort with IBC. To fully staff the JPMO, DHS headquarters has requested and obtained component detailees with deep knowledge of component business processes and strong program management skills. The organizational structure of the JPMO provides single points of contact to communicate directly with the new system integrator. This eliminates the need for the system integrator to communicate with both DHS HQ and the component during the implementation. DHS will have direct contract oversight and engagement with vendors' contractors that support this effort. The JPMO is establishing contract requirements that will enable the JPMO to manage program cost, schedule, and performance. This will include reports submitted by the system integrator contractor that captures monthly performance metrics for the scope, cost, and schedule, which the FSM JPMO will use to analyze and monitor performance throughout the program. The JPMO will compare these reports against the planned statement of work, schedule, and cost to assess the progress towards achieving program objectives, and inform decision-making activities for this effort. DHS will utilize a contract management plan to set acceptable quality levels that will be used to measure the quality of deliverables based on established, well-defined acceptance criteria. The contract will include a set of incremental deliverables for the contractor that will provide evidence of program progress against the planned cost and schedule, and allow DHS the opportunity to identify issues early, and develop and implement corrective actions more timely. Delivery of these artifacts will be aligned with recurrent program gate reviews to assess overall program progress. Question 2. What role will IBC play in assisting the new system integrator? Does the Interagency Agreement require IBC to provide support for the TSA solution once it is transitioned to DHS? Will the new system integrator be able to collaborate with IBC after the transition? Answer. The transition will require support from DOI IBC resources for the virtual transition of the solution, and the stand-up, testing, and validation of such solution once relocated to the DHS data centers. DOI IBC will facilitate technical knowledge transfer, either through documentation or discussions with the new hosting and system deployment vendors. DOI IBC will support the transition of the operation and maintenance support, including help desk services, to the DHS vendors and personnel. Lastly, DOI IBC will develop, deliver, and execute a plan for the careful, safe retirement and decommissioning of DHS specific information and or systems at the conclusion of the transition phase. DOI IBC will not provide direct solution support after the system has been fully transitioned to the DHS data center. DHS has included options within the transition Interagency Agreement (IAA) that will allow DHS and its vendors the ability to consult with DOI IBC after the transition to DHS is completed. Question 3. How will DHS ensure that mistakes made in previous failed modernization efforts with industry vendors will not be repeated? Answer. DHS has gathered lessons learned from past attempts at financial systems modernization and incorporated them into the new approach. For example, DHS will segment the implementation using incremental deliverables with well-defined acceptance criteria. To monitor and oversee contractor performance, DHS has included EVM reporting requirements within the new contracts. To manage and control scope, DHS will leverage existing automated tools to track and manage requirements from operational, functional, and technical requirements through testing, with full traceability. This will allow better tracking of both the global requirements that are shared across all components and improve the identification and documentation of component-specific requirements. DHS will incorporate the full scope of testing activities, including testing of data and operational testing. Automated tools and extensive testing were noted lessons learned with our partnership with IBC. The JPMO will lead the organizational change management effort so that the organization is prepared from inception through post- implementation support. DHS will standardize the approach to change management through the application of a structured process and set of tools, across components, to better support users through change. This standardized approach includes early establishment of stakeholder engagement forums such as peer support networks, targeted, more frequent communications, and a much-improved approach to training users. Training will be transitioned from the basic system training provided by IBC to role-based, business process-based training. DHS will also move away from the train-the-trainer approach for most components, and leverage instead professional training resources, deeply familiar with the system, provided through the new contract. Improving program-wide change management will enable smoother transitions, allow users to more quickly become proficient, and addresses best practices identified through the regular lessons learned exercises DHS performed during the IBC engagement. Question 4. Aside from TSA and Coast Guard, what are the Department's plans, including time frames, for modernizing other component systems? What risks, if any, exist with modernizing these systems? What additional costs might the Department incur in modernizing these systems? Answer. DHS has begun the planning to establish a strategic sourcing vehicle to meet the financial management system software needs for all DHS components. FEMA, ICE, and their customers plan to leverage the DHS strategic sourcing vehicle. The ICE and FEMA legacy systems are near end-of-life. The DHS components will continue to incur costs to maintain the legacy systems until they are modernized. The modernization risks are similar to those documented for the TSA and USCG. Risks include availability of funds, contract management, organization change management, data conversion, interfaces, and other technical risks. The delay for FEMA will also have cascading negative effects on other FEMA critical modernization efforts (Grants Management Modernization and NFIP's insurance system modernization, known as Pivot). The delayed FSM will require a connection to FEMA's legacy system now, and then a connection to the modernized system, which will require additional investment and effort. The JPMO will begin updating the cost estimates for FEMA, ICE, and the ICE customers in Q1 fiscal year 2018. After the LCCEs are completed, we welcome an opportunity to provide an update to the committee. Questions From Chairman Scott Perry for Elizabeth Angerman Question 1. What role will USSM have assisting DHS as it transitions to away from IBC and takes control of the TRIO solution? Answer. USSM's role is to advise agencies on lessons learned as they implement shared services. The USSM Modernization and Migration Management (M3) Playbook is a valuable compilation of best practices and lessons learned from Government and industry for system modernizations in a shared environment. USSM will also continue to work with the Chief Financial Officer community to design common requirements for integrated solutions for mission support functions. As DHS defines its vision for the end-state solution, these integrated standards will be the foundation for moving forward. However, it remains the responsibility of the agencies to determine the best path forward for their modernizations. USSM recommends that DHS leverage the M3 Playbook as it consolidates internally. USSM will continue to be available to support DHS as an independent and objective resource, as needed and appropriate. Question 2. What are the biggest risks DHS must identify, monitor, and mitigate to achieve financial systems modernization for the Transportation Security Administration (TSA) and the United States Coast Guard (USCG)? Answer. Change Management.--The most difficult part of these projects is re-engineering business processes to align to the solution and then helping the users to buy into and adopt the change. Focusing on training, clarifying roles and responsibilities, establishing service-level agreements, and defining overall success for the program by providing the proper attention, time, and resources is critical. Business Process Re-engineering needs to be the preferred method of resolving any identified gaps over modification/ customization of the software. Governance structures need to support the idea of ``one decision maker'' for the consolidated solution. Sufficient communication with the stakeholder community is required to prepare them for the change and make sure they understand the value proposition. Leveraging the M3 Playbook to create a business and technical end-state (with metrics to measure success) for the financial management function at DHS would help to create a shared vision for success. Program Management.--DHS should adopt project management best practices such as developing a resource-loaded schedule which is used to track actual costs of various program activities. The value of an integrated, resource-loaded project schedule and strong schedule management discipline cannot be underestimated. Define roles and responsibilities of the headquarters and component organizations, and assign one responsible official for decision making. Define risks, mitigation strategies, and management practices critical to ensuring success. Governance.--A single accountable entity is critical as consensus management is not an effective way to make decisions and govern a large Department-wide program. An expedited and integrated decision-making process that addresses issues and mitigates risks is critical and must include senior officials in the agencies. There is great value in having an integrated, co-located program management team to lead the work activities and identify and resolve gaps, conflicts, and priorities on a daily basis. A single accountable entity is critical to resolve disputes and make decisions. Scope.--Project planning in the early stages is key. DHS needs to clearly define and articulate the vision for the end-state solution to include the strategy and a roadmap to achieve the vision. Stakeholders at all levels should be bought into the vision. Importance of early stages of project planning--need to clearly define and articulate the vision for the financial management end-state, to include the strategy and a roadmap to achieve the vision. All stakeholders need to understand the end-state to ensure scope creep does not imperil the timely completion of the work within the defined budget. [all]