[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]






    SECURING FEDERAL FACILITIES: AN EXAMINATION OF FPS PROGRESS IN 
                 IMPROVING OVERSIGHT AND ASSESSING RISK

=======================================================================

                                HEARING

                               before the

                     SUBCOMMITTEE ON CYBERSECURITY,
                       INFRASTRUCTURE PROTECTION,
                       AND SECURITY TECHNOLOGIES

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                             JULY 24, 2012

                               __________

                           Serial No. 112-108

                               __________

       Printed for the use of the Committee on Homeland Security
                                     


[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]




                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________

                                _____

                  U.S. GOVERNMENT PRINTING OFFICE

80-850 PDF                WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop SSOP, Washington, DC 
20402-0001





                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Cedric L. Richmond, Louisiana
Joe Walsh, Illinois                  Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Ron Barber, Arizona
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director

                                 ------                                

SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY 
                              TECHNOLOGIES

                Daniel E. Lungren, California, Chairman
Michael T. McCaul, Texas             Yvette D. Clarke, New York
Tim Walberg, Michigan, Vice Chair    Laura Richardson, California
Patrick Meehan, Pennsylvania         Cedric L. Richmond, Louisiana
Billy Long, Missouri                 William R. Keating, Massachusetts
Tom Marino, Pennsylvania             Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)
                    Coley C. O'Brien, Staff Director
                 Zachary D. Harris, Subcommittee Clerk
        Chris Schepis, Minority Senior Professional Staff Member












                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Daniel E. Lungren, a Representative in Congress 
  From the State of California, and Chairman, Subcommittee on 
  Cybersecurity, Infrastructure Protection, and Security 
  Technologies:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable Yvette D. Clarke, a Representative in Congress From 
  the State of New York, and Ranking Member, Subcommittee on 
  Cybersecurity, Infrastructure Protection, and Security 
  Technologies:
  Oral Statement.................................................     4
  Prepared Statement.............................................     5

                               Witnesses

General L. Eric Patterson, Director, Federal Protective Service, 
  Department of Homeland Security:
  Oral Statement.................................................     7
  Prepared Statement.............................................     8
Mr. Mark L. Goldstein, Director, Physical Infrastructure Issues, 
  Government Accountability Office:
  Oral Statement.................................................    11
  Prepared Statement.............................................    12
Dr. James P. Peerenboom, Director, Infrastructure Assurance 
  Center, Associate Director, Decision and Information Sciences 
  Division, Argonne National Laboratory:
  Oral Statement.................................................    18
  Prepared Statement.............................................    19

                                Appendix

Questions From Chairman Daniel E. Lungren for L. Eric Patterson..    33
Questions From Ranking Member Yvette D. Clarke for L. Eric 
  Patterson......................................................    33
Questions From Ranking Member Yvette D. Clarke for Mark L. 
  Goldstein......................................................    34
Questions From Ranking Member Yvette D. Clarke for James P. 
  Peerenboom.....................................................    35

 
    SECURING FEDERAL FACILITIES: AN EXAMINATION OF FPS PROGRESS IN 
                 IMPROVING OVERSIGHT AND ASSESSING RISK

                              ----------                              


                         Tuesday, July 24, 2012

             U.S. House of Representatives,
                    Committee on Homeland Security,
 Subcommittee on Cybersecurity, Infrastructure Protection, 
                                 and Security Technologies,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 10:09 a.m., in 
Room 311, Cannon House Office Building, Hon. Daniel E. Lungren 
[Chairman of the subcommittee] presiding.
    Present: Representatives Lungren, Walberg, Clarke, 
Richmond, and Keating.
    Mr. Lungren. The Committee on Homeland Security, 
Subcommittee on Cybersecurity, Infrastructure Protection, and 
Security Technologies will come to order. The subcommittee is 
meeting today to examine the Federal Protective Service and the 
possible need for reform.
    Ms. Clarke will be here shortly, and so I am just going to 
give my opening statement and when she arrives she will be able 
to give her opening statement.
    Thank you very much for being here, all three of our 
witnesses. This is an important hearing.
    The Federal Protective Service is a vital part of the 
Department of Homeland Security. It is the largest operational 
component within the National Protection and Programs 
Directorate.
    The FPS mission is to protect over 9,000 Government 
buildings and their 1.4 million occupants, which are essential 
to the day-to-day operations of the Federal Government. Recent 
incidents at Federal facilities such as the failed improvised 
explosive device, as well as the bombing of Oklahoma City's 
Murrah Federal Building in 1995, remind us the Federal 
facilities remain attractive terrorist targets.
    This subcommittee has conducted rigorous oversight over the 
Federal Protective Service this Congress. Last July we held a 
hearing which identified some of the perennial problems 
plaguing the FPS.
    In that hearing we discussed failures of contract guard 
oversight and their training program, including the egregious 
mishandling of an IED in Detroit. We also discussed the failed 
development of FPS's risk management program, known as RAMP, 
which cost the Federal Government $35 million over 4 years. I 
am hopeful and cautiously optimistic that these problems 
represent the low-water mark for FPS.
    Since 2008 GAO has made 32 recommendations to improve FPS 
security vulnerabilities and other operational problems, five 
of which have been implemented and 20 which are in the process 
of implementation.
    From the outset I do want to commend Director Patterson for 
his leadership. I believe the recent successes in implementing 
GAO recommendations are in part the result of improved dialogue 
and outreach with the private sector as well as the efforts of 
FPS's own workforce.
    I think this dialogue is extremely important as FPS works 
to address the remaining GAO recommendations, especially in its 
two core areas of responsibility: First, its ability to conduct 
risk assessments of Federal buildings; and second, to provide 
necessary oversight and training for its contract guard force.
    Regarding the first responsibility, FPS began operational 
testing this last spring for a new risk assessment tool, known 
as the modified infrastructure survey tool, or MIST, which was 
developed in partnership with the Argonne National Laboratory. 
MIST is intended to be an interim tool that FPS inspectors use 
to conduct vulnerability assessments in the aftermath of the 
RAMP failure.
    I understand, am informed that there is a disagreement 
between FPS and GAO with regard to the limitations and benefits 
of MIST and I look forward to hearing from our witnesses 
regarding these differences. I am aware of some of the 
limitations identified by GAO that MIST does not account for 
consequence information and therefore does not provide FPS the 
comprehensive ability to manage risk. I also understand GAO has 
concerns that MIST is neither compliant with the National 
infrastructure protection plan framework nor compliant with 
standards developed by the Interagency Security Committee.
    I think these are very legitimate questions raised by GAO 
and important standards FPS should meet when it develops a 
longer-term solution. Nonetheless, I do consider MIST 
development a step in the right direction for an agency that 
has taken a series of steps in the wrong direction over the 
last decade.
    FPS has always stated that MIST is intended to serve as an 
interim tool until a longer-term solution is developed. 
However, FPS has never stated what the longer-term solution 
will be. So I look forward to hearing from Director Patterson 
on his vision for MIST's future as a risk management tool.
    I also look forward to learning about what FPS is doing to 
address GAO's findings about unnecessary duplication of risk 
assessments by several FPS customers who in some instances have 
expressed dissatisfaction with FPS's assessments--for instance, 
the IRS, FEMA, and EPA.
    Providing oversight and training of the contract guard 
program is also a critical responsibility of FPS. At last 
summer's hearing Director Patterson stated that he was looking 
at different ways that FPS may be able to improve delivery of 
X-ray and magnetometer training.
    I look forward to hearing more about how these ideas have 
developed since last year. I also understand there has been 
outreach to the private sector regarding better training 
options and I commend you for those efforts.
    Finally, FPS has undergone significant transition since 
joining the Department of Homeland Security. After initially 
being placed under ICE, after the creation of DHS, FPS moved to 
NPPD in 2010, and last summer NPPD notified the committee that 
it was once again considering reorganizing the directorate. Is 
reorganization being contemplated, and if so, how will this 
impact FPS?
    I want to thank all of our witnesses for being here this 
morning, and I look forward to your testimony on the progress 
made by the FPS in securing our Nation's Federal facilities.
    [The statement of Chairman Lungren follows:]
                Statement of Chairman Daniel E. Lungren
                             July 24, 2012
    The Federal Protective Service (FPS) is a vital part of the 
Department of Homeland Security and is the largest operational 
component within the National Protection and Programs Directorate 
(NPPD). Its mission to protect some 9,000 Government buildings and its 
1.4 million occupants is essential for the Federal Government to 
continue day-to-day operations. Recent incidents at Federal facilities 
such as the failed IED attempt in Detroit, and the bombing of Oklahoma 
City's Murrah Federal Building in 1995, remind us that Federal 
facilities remain significant symbolic targets for terrorists.
    This subcommittee has conducted rigorous oversight over the Federal 
Protective Service this Congress. Last July we held a hearing which 
identified some of the perennial problems plaguing the FPS. In that 
hearing we discussed failures of contract guard oversight and training, 
including the egregious mishandling of an attempted Improvised 
Explosive Devise in Detroit, and the failed development of a risk 
management program known as RAMP, which after 5 years of development, 
cost the Federal Government somewhere between $35-57 million with 
little to show for. I am hopeful that these incidents represent the 
low-water mark for FPS, and I am cautiously optimistic about FPS's 
future.
    Last July the GAO had issued a total of 28 recommendations for FPS 
to address, yet at the time none were implemented. Today, I am 
encouraged to note that while GAO has recommended 32 recommendations, 
to date, 5 have been implemented and 20 are in the process of 
implementation. This represents significant progress.
    From the outset, I want to commend Director Patterson for his 
leadership and the agency's recent successes. These successes, I 
believe are in part the result of improved dialogue and substantial 
outreach with private-sector partners as well FPS's own workforce. I 
think this dialogue is extremely important as FPS works to address 
important recommendations made by the Government Accountability Office, 
especially as it works to improve two of its core areas of 
responsibility: (1) Its ability to conduct risk assessments of Federal 
buildings; and (2) provide necessary oversight and training for its 
Contract Guard Program.
    Regarding this first responsibility, FPS began operational testing 
this last spring for a new risk assessment tool, known as the Modified 
Infrastructure Survey Tool or MIST, which was developed in partnership 
with the Argonne National Laboratory. MIST is intended to be an interim 
tool FPS inspectors use to conduct facility security assessments, in 
the aftermath of RAMP's failure.
    I understand there is some pretty substantial disagreement between 
FPS and GAO with regard to the limitations and benefits of MIST and I 
look forward to hearing from our witnesses regarding these differences. 
I am aware of some of the limitations identified by GAO, such as that 
MIST does not account for ``consequence'' information, and therefore 
does not provide FPS the comprehensive ability to manage risk. I also 
understand GAO has concerns that MIST is neither compliant with the 
National Infrastructure Protection Plan framework nor compliant with 
standards developed by the Interagency Security Committee. I think 
these are very legitimate questions raised by GAO, and are important 
standards FPS should meet when it develops a longer-term solution.
    Nonetheless, I consider MIST's development a step in the right 
direction for an agency that has taken a series of steps in the wrong 
direction over the last decade. FPS has always stated that MIST is 
intended to serve as an interim tool until a longer-term solution is 
developed. However, FPS has never stated what the longer-term solution 
will be. I look forward to hearing from Director Patterson on his 
vision for MIST's future as a risk management tool. I also look forward 
to learning about what FPS is doing to address GAO's finding about 
unnecessary duplication of risk assessments by several FPS customers, 
who in some instances, are dissatisfied by assessments provided by FPS.
    Providing oversight and training of the contract guard program is 
also a critical responsibility of FPS. At last summer's hearing 
Director Patterson stated that he was looking at different ways FPS may 
be able to improve delivery of X-ray and magnetometer training. I look 
forward to hearing more about how these ideas have developed since last 
year. I understand there has been significant outreach with the private 
sector that may be able to better deliver training, and I commend you 
for putting an emphasis on training in your tenure at FPS.
    Finally, FPS has undergone significant transition since joining the 
Department of Homeland Security. After initially being placed under ICE 
after the creation of DHS, FPS moved to NPPD in 2010. Last summer, NPPD 
notified the committee that it was once again considering reorganizing 
the agency which FPS was assigned. However, since last summer, the 
Department has been silent on its plans to reorganize NPPD, so I am 
very much looking forward to hearing from Director Patterson on his 
thoughts on reorganization, and if we can expect any more information 
on this soon.
    I want to thank all of our witnesses for being here this morning 
and look forward to their testimony on progress made by the FPS 
securing our Nation's Federal facilities. I now recognize the gentle 
lady from New York, the Ranking Member of this subcommittee, Ms. 
Clarke, for her opening statement.

    Mr. Lungren. I now have the pleasure of recognizing the 
gentle lady from New York, the Ranking Member of the 
subcommittee, Ms. Clarke, for her opening statement.
    Ms. Clarke. Thank you, Mr. Chairman, and thank you for 
holding this hearing today. Today's hearing will allow the 
subcommittee to hear from witnesses about the Federal 
Protective Service's progress in improving its ability to 
provide adequate protection to the Federal Government's more 
than 9,000 facilities.
    Given the numerous studies that FPS has undertaken by the 
Government Accountability Office and the multiple hearings held 
by this committee, the subcommittee is interested in learning 
about the actions FPS has taken to upgrade its ability to 
conduct facility security assessments, better manage its 
contract guard staff, and to enhance funding for its 
operations. We need a more clear explanation of the 
implementation and utility of the modern infrastructure survey 
tool, or MIST, and how it compares, hopefully surpasses, the 
failed risk assessment and management program, or RAMP.
    The subcommittee must be assured that after investing 
approximately $35 million RAMP without yielding any 
demonstrable outcomes FPS is indeed expending its resources 
effectively and scaling up MIST. We need assurances that MIST 
is working as an interim solution, and we need to know what 
FPS's long-term strategy to replace RAMP. Also, as the 
designated leader of the Federal Government facilities sector 
FPS has an important role to play in assuring that the Federal 
critical infrastructure both secure--that the--excuse me--the 
Federal critical infrastructure is both secure and resilient in 
the event of a catastrophic occurrence.
    In August GAO will issue a report at Ranking Member 
Thompson's request that evaluates the Department's activities 
regarding the Government facilities sector with a particular 
emphasis on FPS's role as the designated sector leader. I look 
forward to the release of that report and hope that we are able 
to revisit this subject at that time.
    Finally, Mr. Chairman, I am concerned that FPS is forced to 
bear the cost of developing and implementing a program capable 
of completing security assessments of Federal buildings. It 
seems to me that as the landlord for most Federal buildings, 
the General Services Administration benefits from these 
security assessments. I look forward to hearing from our 
witnesses today about the role of GSA in sharing the cost of 
the assessment program.
    Having said that, thank you, Mr. Chairman, and I yield 
back.
    [The statement of Ranking Member Clarke follows:]
              Statement of Ranking Member Yvette D. Clarke
                             July 26, 2012
    Mr. Chairman, thank you for holding this hearing to discuss 
developments in the Domestic Nuclear Detection Office Strategy, and the 
Global Nuclear Detection Architecture.
    It has been said before, the enormous devastation that would result 
if terrorists use a nuclear weapon or nuclear materials successfully, 
requires us to do all we can to prevent them from entering or moving 
through the United States.
    This subcommittee, in its oversight capacity, has held hearings 
starting in 2005, and continuing through 2012, regarding the 
development and implementation of the GNDA and in the decision-making 
process that involves costly investments in it.
    The overarching issues include the balance between investment in 
near-term and long-term solutions for architecture gaps, the degree and 
efficiency of Federal agency coordination, the mechanism for setting 
agency investment priorities in the architecture, and the efforts DNDO 
has undertaken to retain institutional knowledge regarding this 
sustained effort.
    In the policy and strategy documents of the GNDA, DNDO is 
responsible for developing the global strategy for nuclear detection, 
and each Federal agency that has a role in combating nuclear smuggling 
is responsible for implementing its own programs. DNDO identified 73 
Federal programs, which are primarily funded by DOD, DOE, and DRS that 
engage in radiological and nuclear detection activities.
    With the publication of an overall DNDO strategy document and the 
release of the Global Nuclear Detection Architecture and implementation 
plan, Congress will have a better idea of how to judge the DNDO's 
policy, strategy operations, tactics, and implementation.
    But we need to know more about their R&D activities, their resource 
requests, and their asset allocations. And I know that I might sound 
like a broken record before the day is through, but from the very start 
of the ASP program which was officially cancelled just 10 days ago, 
July 16, DNDO seemed to push for acquisition decisions well before the 
technology had demonstrated that it could live up to its promise.
    On July 14, 2006, Secretary of Homeland Security Michael Chertoff 
and the then-Director of DNDO, Mr. Oxford, one of our witnesses today, 
announced contract awards to three companies worth an estimated $1.2 
billion to develop ASPs, including the Raytheon Company from 
Massachusetts, the Thermo Electron Company from Santa Fe, New Mexico, 
and Canberra Industries from Connecticut. Both Secretary Chertoff and 
Oxford held a press conference to announce the billion-dollar contract 
awards just a few months after highly critical reviews of the ASPs' 
abilities by the GAO and the National Institute of Standards and 
Technology (NIST).
    I hope we don't see that kind of decision making again in DNDO.
    Within DNDO, policy and strategy have historically not been 
adequately translated into operations, tactics, and implementation. 
Overlapping missions, especially in the field of nuclear detection, 
worsen this.
    Since 2009, DNDO has made important changes under Secretary 
Napolitano, and made especially good progress in nuclear forensics. And 
I hope that our Congressional oversight has had an effect, a positive 
one, in bringing to light decisions that cost the taxpayers a lot of 
money, with little to show.
    In 2010, the Science and Technology (S&T) Directorate requested 
$109.000 million for the Transformational Research and Development 
Radiological and Nuclear Division. This research was to be transferred 
from DNDO to the S&T Directorate,\1\ and the Democratic committee 
Members supported the transition of radiological and nuclear research 
away from DNDO into S&T. The committee, under then-Chairman Thompson, 
worked to make this transition happen, and we believe that research and 
development, and operations and procurement, are best left to separate 
organizations in order to avoid the obvious conflict of interest.
---------------------------------------------------------------------------
    \1\ DHS Fiscal Year 2011 Budget in Brief, ICE 10-2647.000474. p. 
139.
---------------------------------------------------------------------------
    What I hope we are going to hear today is how DNDO's mission can be 
better-defined. Some claim there is still confusion as to whether it is 
an end-to-end RDT&E and procurement entity for all things nuclear/
radiological, a development entity, or an operational entity, and 
question whether there is an inherent conflict of interest when an 
agency is both an R&D workshop and a procurement platform.
    Let me finish with this thought, completely out of the policy 
arena. On the ground, and every day, our nuclear deterrence effort 
requires motivated and vigilant officers supplied with the best 
equipment and intelligence we can give them. Customs and Border Patrol 
officers working at our Nation's ports of entry have an extremely 
complex and difficult job.
    Thousands of decisions are made every day to clear a container or 
personal vehicle for transit into the United States, require further 
inspection, or even deny entry or interdict such a vehicle or person, 
and that is the hard, cold, every-day reality of our mission to prevent 
this kind of violent nuclear attack.
    We must do our best.
    I look forward to hearing from our witnesses today and with that, 
Mr. Chairman, I yield back.

    Mr. Lungren. I thank the gentlelady for her comments, and I 
think the panel can tell that we are on the same page at 
looking at what the progress has been since our last hearing.
    General L. Eric Patterson was appointed director of the 
Federal Protective Service, a subcomponent of the National 
Protective--Protection and Programs Directorate, in September 
2010. He previously served as the deputy director of the 
Defense Counterintelligence HUMINT Center at the Defense 
Intelligence Agency.
    Prior to joining DIA Mr. Patterson served as a principal 
with Booz Allen Hamilton where he supported two of the Defense 
Technical Information Center analysis centers, one focused on 
information assurance and the other on the survivability and 
vulnerability of defense systems. He is a retired United States 
Air Force brigadier general with 30 years of service.
    Mr. Mark Goldstein is the director of physical 
infrastructure issues at GAO. Mr. Goldstein is responsible for 
the agency's work in Federal property and telecommunications. A 
former award-winning journalist and author, his other public 
service work has included roles as chief of staff to the D.C. 
Financial Control Board and senior investigative staff to the 
Senate Committee on Governmental Affairs.
    Dr. James Peerenboom is the associate director of the 
decision and information sciences division at the Argonne 
National Laboratory, near Chicago, Illinois. In this role he is 
responsible for leading multidisciplinary teams of scientists 
and engineers in developing innovative solutions for 
infrastructure assurance, systems analysis, decision and risk 
analysis, and advanced modeling and simulation problems.
    For the past 15 years he has focused on critical 
infrastructure protection and resilience issues, providing 
technical support to the Departments of Energy and Homeland 
Security, the President's commission on critical infrastructure 
protection, and White House Office of Science and Technology 
Policy. He received his Ph.D in energy and environmental 
systems from the Institute of Environmental Studies and an M.S. 
and B.S. in nuclear engineering from the University of 
Wisconsin at Madison.
    Gentlemen, we ask you--well, we would first indicate that 
your written testimony will be made a part of the record and 
would ask that you summarize your testimony with any additions 
as you wish in 5 minutes, and then we will have a round of 
questioning.
    So the Chairman would recognize Director Patterson to 
begin.

 STATEMENT OF L. ERIC PATTERSON, DIRECTOR, FEDERAL PROTECTIVE 
            SERVICE, DEPARTMENT OF HOMELAND SECURITY

    General Patterson. Good morning. Thank you, Chairman 
Lungren, Ranking Member Clarke.
    My name is Eric Patterson and I am the director of the 
Federal Protective Service within the Department of Homeland 
Security's National Protection and Programs Directorate. I am 
honored to appear before you today to discuss FPS's progress in 
addressing some historically identified challenges.
    FPS's mission is to protect more than 9,000 Federal 
buildings throughout the United States and its territories and 
the 1.4 million Federal employees and visitors who occupy and 
conduct business in them every day. We execute this mission by 
providing proactive law enforcement, investigations, protective 
intelligence, incident response, security planning, and 
stakeholder engagement.
    Based upon my experience in the ever-changing threat 
environment, my belief is that risk assessment is a continuous 
process and not a static event. Our law enforcement and 
physical security professionals continually provide access risk 
and implement mitigation strategies through their daily 
activities.
    During fiscal year 2011 FPS investigated and mitigated more 
than 1,300 threats and assaults directed towards Federal 
facilities and their occupants, made close to 2,000 arrests, 
responded to 53,000 incidents, and prevented the entry of 
hundreds of thousands of prohibited items into Federal 
facilities. FPS also conducted 1,800 Operation Shield 
exercises, 150 Covert Test operations, over 80,000 post 
inspections, and also validated the training of thousands of 
protective security officers that we oversee.
    Over the past year FPS developed an important partnership 
with Argonne National Lab resulting in the completed 
development and current deployment of a new facility security 
assessment tool, called the modified infrastructure survey 
tool, or MIST. MIST will enable comprehensive and consistent 
FSAs that will allow Federal tenant agencies to make informed 
security and risk management decisions. The MIST tool is a 
welcome addition to FPS's portfolio of on-going facility 
assessment efforts and strategies.
    As GAO has indicated, FPS employed the best project 
management principles in the development of MIST. MIST 
requirements were developed leveraging the knowledge obtained 
from our long-standing relationships with the General Services 
Administration, the Facility Security Committee, and other 
customers.
    As we move to measure and assure the successful performance 
of MIST my plan is to build upon this foundation to improve 
FPS's management of other significant programs--for example, 
our protective security officer program. Just as technology is 
enhancing our risk assessment processes, I plan to better 
leverage technology to allow for more effective oversight of 
our contract PSOs.
    A key enabler of these actions will come from the good work 
of our collaboration with the Systems Engineering and Design 
Institute, SEDI, a Federally-funded research and development 
center. We have engaged the SEDI to produce a full mapping of 
FPS activities and to then align them with FPS's current fee 
structure. That work will be used to produce an activity-based 
cost model for FPS.
    These efforts are designed to result in a more efficient 
revenue structure for FPS and greater transparency on security 
costs for FPS stakeholders.
    I am also pleased to note that some of our recent progress 
includes an increased participation in the important work of 
the Interagency Security Committee to include chairing a new 
ISC working group which will look at the future of Federal 
workplace security and the newly reconstituted Training 
Subcommittee.
    FPS's program--progress in the past year and our path 
forward leveraging partnerships and technology is clearly in 
direct support of our long-term vision. It will continue to 
take time, deliberate planning, and the dedication of our 
employees and partners to fully realize our vision and I look 
forward to keeping you apprised of our progress.
    Again, thank you for the opportunity to discuss FPS with 
you today, and I would be happy to answer any questions you 
might have.
    [The prepared statement of Mr. Patterson follows:]
                Prepared Statement of L. Eric Patterson
                             July 24, 2012
    Thank you Chairman Lungren, Ranking Member Clarke, and the 
distinguished Members of the subcommittee. My name is Eric Patterson, 
and I am the Director of the Federal Protective Service (FPS) within 
the Department of Homeland Security's (DHS) National Protection and 
Programs Directorate (NPPD).
    I am honored to appear before you today to discuss NPPD/FPS's 
progress in utilizing key protection and risk management practices such 
as allocation of resources, leveraging technology, and enhancing 
information sharing and coordination.
    The GAO has raised several areas that have historically represented 
challenges for FPS including:
    1. Absence of a risk management program;
    2. Addressing key human capital issues through a strategic human 
        capital plan;
    3. Contract Guard workforce management and oversight; and
    4. Need for a review of FPS's fee design.
    Today's hearing is an opportunity to address the progress FPS has 
made during the past year in working to address these challenges, and 
to also provide information on the topics addressed in GAO's new report 
related to risk assessment and Protective Security Officer (PSO) 
program management and oversight.
                             fps background
    FPS's mission is to protect more than 9,000 Federal buildings and 
the 1.4 million Federal employees and visitors who occupy them 
throughout the country every day by leveraging the intelligence and 
information resources of its network of public and private-sector 
partners. Specifically, FPS executes its mission by providing proactive 
law enforcement, investigation and protective intelligence and 
information sharing services, incident response, security planning, and 
stakeholder engagement. Prior to its transfer to NPPD in 2009, FPS was 
organized under Immigration and Customs Enforcement and prior to that, 
under the General Services Administration (GSA).
    Part of our core mission is to assess the threat picture for the 
Government Facilities Sector (GFS) and share that information with 
stakeholders as appropriate. For example, FPS leverages the Homeland 
Security Information Network (HSIN), a secure, trusted web-based portal 
to share information with our more than 900 Government and industry 
partners. One of the recent information-sharing initiatives FPS has 
implemented to assist in the protection of facilities and their 
occupants is the Federal Facility Threat Picture (FFTP), which is an 
unclassified assessment of the current known threats to the facilities 
FPS protects. Produced quarterly, the FFTP supports the threat 
component of a Federal Security Assessments (FSA) and informs our 
stakeholders of potential threats to Government facilities. The FFTP 
focuses on the threats posed by a variety of actors that may seek to 
attack or exploit elements of the GFS. The information used in the FFTP 
comes from intelligence and law enforcement community reporting.
    During fiscal year 2011, FPS:
   Investigated and mitigated more than 1,300 threats and 
        assaults directed towards Federal facilities and their 
        occupants;
   Disseminated 331 threat- and intelligence-based products to 
        our stakeholders, 142 of which were FPS-produced;
   Conducted 81,125 post inspections;
   Interdicted more than 680,000 weapons/prohibited items 
        including knives, brass knuckles, pepper spray, and other items 
        that could be used as weapons or are contraband such as illegal 
        drugs, at Federal facility entrances during routine checks;
   Made 1,975 arrests;
   Responded to 53,000 incidents involving people or property; 
        and
   Conducted more than 1,800 high-visibility operations under 
        Operation Shield and 150 risk-based Covert Test operations, 
        ensuring the protection of Federal buildings and 
        infrastructure.
              fps is developing a risk management program
    In terms of a risk management program, FPS's operational activities 
are organized by the National Infrastructure Protection Plan's (NIPP) 
Risk Management Framework, which calls for the following steps: Set 
Security Goals, Identify Assets and Functions, Assess Risks, 
Prioritize, Implement Protective Programs, and Measure Effectiveness. 
One area of recent significant progress related to risk assessment and 
the implementation of a risk management program is the on-going 
implementation of FPS's solution for conducting FSAs using an automated 
assessment tool. In May 2011, the decision was made to cease 
development of the legacy application known as the Risk Assessment and 
Management Program (RAMP) and to pursue a stand-alone assessment tool, 
in order to provide completed FSAs to customers. That decision has 
since been affirmed by the Department's Office of Inspector General 
(OIG).
    In the interim period, our employees have continued their daily 
interactions with tenant agencies and oversight of facility security. 
Our personnel have been completing Pre-Modified Infrastructure Survey 
Tool (MIST) worksheets to enable complete FSA reports, and are 
constantly assessing risks to Federal facilities. Specifically, the 
pre-MIST worksheet allows the inspector to collect key information that 
will be populated into MIST and used in generating a final FSA report. 
Such data includes facility information, vulnerability assessments, and 
existing protective measures.
    After consideration of several alternatives, FPS partnered with 
NPPD's Office of Infrastructure Protection (IP) to leverage a proven 
assessment methodology called the Infrastructure Survey Tool (IST). In 
October 2011, NPPD issued a task order to Argonne National Laboratory 
(ANL) through the Department of Energy to modify the existing Link 
Encrypted Network System (LENS) and IST for FPS use to conduct FSAs. 
Because this project leveraged existing tools and had limited resources 
and time constraints, the acquisition life cycle was tailored to meet 
delivery deadlines.
    I am pleased to note that in its draft report, GAO noted FPS's use 
of project management principles in the development of MIST. Throughout 
the project, the MIST Users Working Group has remained engaged to 
ensure user involvement in the process. User feedback from field 
testing was uniformly positive about MIST and the FPS Gateway, 
confirming suitability to support the FPS mission. The MIST and FPS 
Gateway development efforts were completed on schedule, with ANL 
delivering the system to the Government on March 30, 2012. In April 
2012, and the decision was made to proceed and deploy MIST. It is 
important to note that throughout the development and testing of MIST, 
field employees and our union were involved and actively participated 
as subject matter experts in the process.
    FPS developed and is currently implementing a distance learning-
based training program for each MIST user, as GAO commended in its 
draft report. Supervisors completed this training in April 2012 and 
Inspectors began their virtual training in May 2012, with completion of 
all training anticipated for late September 2012. This provides a 
hands-on learning environment for our Inspectors; they will receive 
virtual instruction as they use the tool in the learning environment. 
Once an Inspector completes the training and successfully briefs his or 
her supervisor on a completed FSA, that Inspector will be able to 
proceed with conducting FSAs and reporting the results to a Facility 
Security Committee.
    In leveraging existing technology in developing MIST, FPS was able 
to incorporate the ability to illustrate the impact of alternative 
countermeasures on a particular vulnerability. MIST will also show how 
a facility is or is not meeting the baseline level of protection for 
its Facility Security Level as set forth in the ISC's Physical Security 
Criteria for Federal Facilities standard and the ISC's Design Basis 
Threat report. This will lead to a more informed and better dialogue 
with tenants and Facility Security committees as FSA results are 
discussed and alternatives are explored. Additionally, FPS recently 
disseminated guidance Nation-wide on the commencement of the use of 
MIST to generate FSAs upon completion of inspector training. The 
anticipated results of the use of MIST are consistent assessment 
results Nation-wide and informed decision-making regarding security 
investments on the part of tenant agencies.
  fps is addressing key human capital issues through development of a 
                      strategic human capital plan
    In order to ensure that human resource requirements are aligned 
appropriately with FPS's overall mission, a Strategic Human Capital 
Plan is being developed in conjunction with NPPD's Human Capital 
Office. We are working to finalize the document; we intend to provide 
the plan and brief the committee when it is finalized.
 fps is working to improve its protective security officer management 
                             and oversight
    FPS is working to improve management and oversight of our over 
13,000 Protective Security Officer (PSO) force. We have reviewed our 
operations Nation-wide and have taken steps at the National program 
level to ensure that performances under contracts are advantageous to 
the Government. We are actively working to implement the 
recommendations resulting from GAO and OIG reviews across the 
organization. Additionally, an Integrated Project Team (IPT) conducted 
a comprehensive review of how FPS resources the PSO oversight function 
and our current oversight policy.
    FPS is also working with DHS's Science and Technology Directorate 
to develop a system for contract guard oversight and explore means of 
leveraging technology to ensure effective oversight of PSOs, such as 
automated tracking of guard post staff levels and PSO possession of the 
necessary credentials to stand post. Additionally, our training team is 
working closely with industry and Federal partners in developing a more 
effective training strategy for our PSOs.
   fps is examining its fee structure in order to review current fee 
                                 design
    FPS operates through fee-based funding revenue, which is calculated 
based on the Federal facility tenant's square footage of occupancy and 
on the collection of services associated with the provisioning of 
reimbursable protective countermeasures. This fee-based financial 
structure is unique among Federal law-enforcement agencies and requires 
a greater degree of understanding internal operations to ensure it is 
properly aligned with FPS's costs.
    To address this challenge, FPS is implementing a two-pronged 
strategy to better understand its activities and costs and recommend 
options for a new revenue structure. In January 2012, FPS collaborated 
with the Department's Systems Engineering and Design Institute (SEDI), 
a Federally Funded Research and Development Center managed by the DHS 
Science and Technology Directorate, to produce a full mapping of FPS 
activities and then align them with costs. That work will be used to 
produce Activity-Based Cost (ABC) models for FPS. Both of these efforts 
are designed to result in a more efficient revenue structure for FPS 
and greater transparency in security costs for FPS stakeholders.
                               conclusion
    Thank you again for the opportunity to provide you with an update 
on the progress FPS is making on a number of fronts. FPS aspires to be 
an exemplary law enforcement and strategic critical infrastructure 
protection organization. This is a vision uniformly shared by FPS 
leadership and operational staff, both at headquarters and in the 
field. I would be happy to answer any questions you might have.

    Mr. Lungren. Thank you very much, Director Patterson. You 
stayed within the time wonderfully. A new record here.
    Now, Mr. Goldstein, please.

      STATEMENT OF MARK L. GOLDSTEIN, DIRECTOR, PHYSICAL 
    INFRASTRUCTURE ISSUES, GOVERNMENT ACCOUNTABILITY OFFICE

    Mr. Goldstein. Thank you, Mr. Chairman and Ranking Member 
Clarke. We are pleased to be here this morning to testify on 
the Federal Protective Service and its efforts to improve its 
security of Federal property, employees, and citizens who use 
these facilities.
    FPS provides security and law enforcement services to over 
9,000 Federal facilities managed by GSA. GAO has reported that 
FPS faces challenges providing security services, particularly 
completing FSAs and managing its contract guard program.
    To address these challenges FPS spent about $35 million in 
4 years developing RAMP, essentially a risk assessment and 
guard oversight tool. However, RAMP ultimately could not be 
used to do either because of system problems.
    My testimony today is based on preliminary work for you, 
Mr. Chairman, and discusses the extent to which FPS is 
completing risk assessments, developing a tool to complete 
FSAs, and managing its contract guard workforce.
    Our preliminary results indicate that: No. 1, the 
Department of Homeland Security's DHS Federal Protective 
Service is not assessing risks at Federal facilities in a 
manner that is consistent with standards such as the National 
infrastructure protection plan's risk management framework as 
FPS originally planned. Instead of conducting risk assessments, 
since September 2011 FPS's inspectors have collected 
information such as location, purpose, agency contacts, and 
current countermeasures.
    This information notwithstanding, FPS has a backlog of 
Federal facilities that have not been assessed for several 
years. According to FPS's own data, more than 5,000 facilities 
were to be assessed in fiscal years 2010 through 2012.
    However, GAO was not able to determine the extent of FPS's 
facility security assessment backlog because the data was 
unreliable. Multiple agencies have expended resources to 
conduct risk assessments themselves even though they also 
already pay FPS for this service.
    Second, FPS has an interim vulnerability assessment tool, 
referred to as MIST, which it plans to use to assess Federal 
facilities until it develops a longer-term solution. In 
developing MIST, FPS generally followed project management best 
practices that GAO had developed, such as conducting user 
acceptance testing.
    However, our preliminary analysis indicates that MIST has 
some limitations. Most notably, MIST does not estimate the 
consequences of an undesirable event occurring at a facility.
    Several of the risk assessment experts GAO spoke with 
agreed that a tool that does not estimate consequences does not 
allow for an agency to fully assess risk. FPS officials stated 
that they did not include consequence information in MIST 
because it was not part of the original design and thus 
requires more time to validate.
    MIST also was not designed to compare risk across Federal 
facilities. Thus, FPS has a limited assurance if critical risks 
at Federal facilities are being prioritized and mitigated. We 
have made recommendations in this area in the past.
    Third, GAO's preliminary work indicates that FPS continues 
to face challenges in overseeing its contract guard program. 
FPS developed the risk assessment and management program, RAMP, 
to help it oversee its contract guard workforce by verifying 
that guards are trained and certified and for conducting guard 
post inspections.
    However, FPS faced challenges using RAMP for guard 
oversight, such as verifying guard training and certification 
information, and has recently determined that it would no 
longer use RAMP. Without a comprehensive system it is more 
difficult for FPS to oversee its contract guard workforce.
    FPS is verifying guard certification and training 
information by conducting monthly audits of guard training and 
certification information. However, FPS does not independently 
verify the contractors' information.
    Additionally, FPS recently decided to deploy a new interim 
method to record post inspections that replaced RAMP. We have 
not reviewed this system.
    This concludes my opening remarks, Mr. Chairman. I would be 
pleased to address any questions you or Members of the 
subcommittee have. Thank you.
    [The prepared statement of Mr. Goldstein follows:]
                Prepared Statement of Mark L. Goldstein
                             July 24, 2012
                             gao highlights
    Highlights of GAO-12-943T, testimony before the Subcommittee on 
Cybersecurity, Infrastructure Protection, and Security Technologies of 
the House Committee on Homeland Security.
Why GAO Did This Study
    FPS provides security and law enforcement services to over 9,000 
Federal facilities managed by the General Services Administration 
(GSA). GAO has reported that FPS faces challenges providing security 
services, particularly completing FSAs and managing its contract guard 
program. To address these challenges, FPS spent about $35 million and 4 
years developing RAMP--essentially a risk assessment and guard 
oversight tool. However, RAMP ultimately could not be used to do either 
because of system problems.
    This testimony is based on preliminary work for the Chairman and 
discusses the extent to which FPS is: (1) Completing risk assessments, 
(2) developing a tool to complete FSAs, and (3) managing its contract 
guard workforce. GAO reviewed FPS documents, conducted site visits at 3 
of FPS's 11 regions and interviewed officials from FPS, Argonne 
National Laboratory, GSA, Department of Veterans Affairs, the Federal 
Highway Administration, Immigration and Customs Enforcement, and guard 
companies; as well as 4 risk management experts.
What GAO Recommends
    GAO is not making any recommendations in this testimony. GAO plans 
to finalize its analysis and report to the Chairman in August 2012, 
including recommendations. GAO discussed the information in this 
statement with FPS and incorporated technical comments as appropriate.
 federal protective service.--preliminary results on efforts to assess 
               facility risks and oversee contract guards
What GAO Found
    GAO's preliminary results indicate that the Department of Homeland 
Security's (DHS) Federal Protective Service (FPS) is not assessing 
risks at Federal facilities in a manner consistent with standards such 
as the National Infrastructure Protection Plan's (NIPP) risk management 
framework, as FPS originally planned. Instead of conducting risk 
assessments, since September 2011, FPS's inspectors have collected 
information, such as the location, purpose, agency contacts, and 
current countermeasures (e.g., perimeter security, access controls, and 
closed-circuit television systems). This information notwithstanding, 
FPS has a backlog of Federal facilities that have not been assessed for 
several years. According to FPS's data, more than 5,000 facilities were 
to be assessed in fiscal years 2010 through 2012. However, GAO was not 
able to determine the extent of FPS's facility security assessment 
(FSA) backlog because the data were unreliable. Multiple agencies have 
expended resources to conduct risk assessments, even though they also 
already pay FPS for this service.
    FPS has an interim vulnerability assessment tool, referred to as 
the Modified Infrastructure Survey Tool (MIST), which it plans to use 
to assess Federal facilities until it develops a longer-term solution. 
In developing MIST, FPS generally followed GAO's project management 
best practices, such as conducting user acceptance testing. However, 
our preliminary analysis indicates that MIST has some limitations. Most 
notably, MIST does not estimate the consequences of an undesirable 
event occurring at a facility. Three of the four risk assessment 
experts GAO spoke with generally agreed that a tool that does not 
estimate consequences does not allow an agency to fully assess risks. 
FPS officials stated that they did not include consequence information 
in MIST because it was not part of the original design and thus 
requires more time to validate. MIST also was not designed to compare 
risks across Federal facilities. Thus, FPS has limited assurance that 
critical risks at Federal facilities are being prioritized and 
mitigated.
    GAO's preliminary work indicates that FPS continues to face 
challenges in overseeing its approximately 12,500 contract guards. FPS 
developed the Risk Assessment and Management Program (RAMP) to help it 
oversee its contract guard workforce by verifying that guards are 
trained and certified and for conducting guard post inspections. 
However, FPS faced challenges using RAMP for guard oversight, such as 
verifying guard training and certification information, and has 
recently determined that it would no longer use RAMP. Without a 
comprehensive system, it is more difficult for FPS to oversee its 
contract guard workforce. FPS is verifying guard certification and 
training information by conducting monthly audits of guard information 
maintained by guard contractors. However, FPS does not independently 
verify the contractor's information. Additionally, according to FPS 
officials, FPS recently decided to deploy a new interim method to 
record post inspections that replaces RAMP.
    Chairman Lungren, Ranking Member Clarke, and Members of the 
subcommittee: We are pleased to be here today to discuss the Department 
of Homeland Security's (DHS) Federal Protective Service's (FPS) efforts 
to complete risk assessments of the over 9,000 Federal facilities under 
the custody and control of the General Services Administration (GSA) 
and oversee its contract guards in the absence of its Risk Assessment 
and Management Program (RAMP), a web-enabled facility security 
assessment (FSA) and guard management system. As we reported in July 
2011, FPS had spent about $35 million and taken almost 4 years to 
develop RAMP--$14 million and 2 years more than planned--but still 
could not use RAMP to complete FSAs because of several factors, 
including that FPS did not verify the accuracy of the Federal facility 
data used.\1\ As a result, FPS's Director decided to stop using RAMP to 
conduct FSAs and instead pursue an interim tool to replace it. FPS also 
experienced difficulty using RAMP to ensure that its guards met 
training and certification requirements, primarily because of 
challenges in verifying guards' data.\2\ In June 2012, FPS also decided 
to stop using RAMP to help oversee its contract guard program.
---------------------------------------------------------------------------
    \1\ GAO, Federal Protective Service: Actions Needed to Resolve 
Delays and Inadequate Oversight Issues with FPS's Risk Assessment and 
Management Program, GAO-11-705R (Washington, DC: July 15, 2011).
    \2\ GAO-11-705R.
---------------------------------------------------------------------------
    For fiscal year 2012, FPS has a budget of $1.3 billion, with over 
1,200 full-time employees and about 12,500 contract security guards, to 
achieve its mission to protect Federal facilities. As part of the FSA 
process, FPS generally attempts to gather and review facility 
information; conduct and record interviews with tenant agencies; assess 
threats, vulnerabilities, and consequences to facilities, employees, 
and the public; and recommend countermeasures to Federal tenant 
agencies. FPS's contract guards are responsible for controlling access 
to Federal facilities, screening access areas to prevent the 
introduction of weapons and explosives, enforcing property rules and 
regulations, detecting and reporting criminal acts, and responding to 
emergency situations involving facility safety and security. FPS relies 
on the fees it charges Federal tenant agencies in GSA-controlled 
facilities to fund its security services.\3\
---------------------------------------------------------------------------
    \3\ 40 U.S.C.  586; 41 C.F.R.  102-85.35; Pub. L. No. 111-83, 123 
Stat. 2142, 2156-57 (2009).
---------------------------------------------------------------------------
    This testimony is based on preliminary results of work we conducted 
for a report that we plan to issue to the Chairman in August 2012. That 
report will contain our final evaluation and recommendations. 
Consistent with the report's objectives, this statement addresses the 
extent to which FPS is: (1) Completing risk assessments, (2) developing 
a tool to complete FSAs, and (3) managing its contract guard workforce. 
To examine the extent to which FPS is completing risk assessments and 
overseeing guards without RAMP, we reviewed, among other things, FPS's 
current FSA procedures and data on completed and planned FSAs for 
fiscal years 2010 to 2012. Specifically, we reviewed FPS's FSA data 
aggregated from its 11 regions to determine the extent of its FSA 
backlog. However, we could not determine the extent of the backlog 
because FPS's data contained a number of missing and incorrect values 
which made the data unreliable. We also visited 3 of FPS's 11 regions 
and interviewed internal and external stakeholders including, among 
others, FPS, GSA, Department of Veterans Affairs, the Federal Highway 
Administration, Immigration and Customs Enforcement, and guard 
companies. We selected these 3 regions based on the number of Federal 
facilities in the region and their security levels, the number of 
contract guards in the region, and geographic dispersion. Our work is 
not generalizable to all FPS regions. To determine the status of FPS's 
efforts to develop an FSA tool, we reviewed, among other things, 
relevant project documents and Federal physical security standards, 
such as DHS's National Infrastructure Protection Plan's (NIPP) risk 
management framework. We also interviewed FPS officials, 
representatives from Argonne National Laboratory, and four risk 
management experts. We selected our four risk assessment experts from a 
list of individuals who participated in the Comptroller General's 2007 
risk management forum.\4\ This work is being conducted in accordance 
with generally accepted Government auditing standards. Those standards 
require that we plan and perform the audit to obtain sufficient, 
appropriate evidence to provide a reasonable basis for our findings and 
conclusions based on our audit objectives. We believe that the evidence 
obtained provides a reasonable basis for our findings and conclusions 
based on our audit objectives.
---------------------------------------------------------------------------
    \4\ GAO, Highlights of a Forum: Strengthening the Use of Risk 
Management Principles in Homeland Security, GAO-08-627SP (Washington, 
DC: April 2008).
---------------------------------------------------------------------------
fps does not currently assess risks at federal facilities but multiple 
             agencies are conducting their own assessments
    Our preliminary results indicate that, in the absence of RAMP, FPS 
currently is not assessing risk at the over 9,000 Federal facilities 
under the custody and control of GSA in a manner consistent with 
Federal standards such as NIPP's risk management framework, as FPS 
originally planned. According to this framework, to be considered 
credible a risk assessment must specifically address the three 
components of risk: Threat, vulnerability, and consequence. As a 
result, FPS has accumulated a backlog of Federal facilities that have 
not been assessed for several years. According to FPS data, more than 
5,000 facilities were to be assessed in fiscal years 2010 through 2012. 
However, we were not able to determine the extent of the FSA backlog 
because we found FPS's FSA data to be unreliable. Specifically, our 
analysis of FPS's December 2011 assessment data showed nearly 800 (9 
percent) of the approximately 9,000 Federal facilities did not have a 
date for when the last FSA was completed. We have reported that timely 
and comprehensive risk assessments play a critical role in protecting 
Federal facilities by helping decision makers identify and evaluate 
potential threats so that countermeasures can be implemented to help 
prevent or mitigate the facilities' vulnerabilities.\5\
---------------------------------------------------------------------------
    \5\ GAO, Homeland Security: Greater Attention to Key Practices 
Would Improve the Federal Protective Service's Approach to Facility 
Protection, GAO-10-142 (Washington, DC: Oct. 23, 2009).
---------------------------------------------------------------------------
    Although FPS is not currently assessing risk at Federal facilities, 
FPS officials stated that the agency is taking steps to ensure Federal 
facilities are safe. According to FPS officials, its inspectors (also 
referred to as law enforcement security officers) monitor the security 
posture of Federal facilities by responding to incidents, testing 
countermeasures, and conducting guard post inspections. In addition, 
since September 2011, FPS's inspectors have collected information--such 
as location, purpose, agency contacts, and current countermeasures 
(e.g., perimeter security, access controls, and closed-circuit 
television systems) at over 1,400 facilities--which will be used as a 
starting point to complete FPS's fiscal year 2012 assessments. However, 
FPS officials acknowledged that this approach is not consistent with 
NIPP's risk management framework. Moreover, several FPS inspectors told 
us that they received minimal training or guidance on how to collect 
this information, and expressed concern that the facility information 
collected could become outdated by the time it is used to complete an 
FSA.
Multiple Federal Agencies Are Conducting Their Own Risk Assessments
    We reported in February 2012 that multiple Federal agencies have 
been expending additional resources to conduct their own risk 
assessments, in part because they have not been satisfied with FPS's 
past assessments.\6\ These assessments are taking place even though, 
according to FPS's Chief Financial Officer, FPS received $236 million 
in basic security fees from Federal agencies to conduct FSAs and other 
security services in fiscal year 2011.\7\ For example, officials we 
spoke with at the Internal Revenue Service, Federal Emergency 
Management Agency, Environmental Protection Agency, and the U.S. Army 
Corps of Engineers stated that they conduct their own risk assessments. 
GSA is also expending additional resources to assess risk. We reported 
in October 2010 that GSA officials did not always receive timely FPS 
risk assessments for facilities GSA considered leasing.\8\ GSA seeks to 
have these assessments completed before it takes possession of a 
property and leases it to tenant agencies. However, our preliminary 
work indicates that as of June 2012, FPS has not coordinated with GSA 
and other Federal agencies to reduce or prevent duplication of its 
assessments.
---------------------------------------------------------------------------
    \6\ GAO, 2012 Annual Report: Opportunities to Reduce Duplication, 
Overlap, and Fragmentation, Achieve Savings, and Enhance Revenue, GAO-
12-342SP (Washington, DC: February 2012).
    \7\ FPS currently charges tenant agencies in properties under GSA 
control a basic security fee of $0.74 per square foot per year for its 
security services including physical security and law enforcement 
activities as per 41 C.F.R.  102-85.35.
    \8\ GAO-10-142.
---------------------------------------------------------------------------
    fps efforts to develop a risk assessment tool are evolving, but 
                           challenges remain
    In September 2011, FPS signed an interagency agreement with Argonne 
National Laboratory for about $875,000 to develop an interim tool for 
conducting vulnerability assessments by June 30, 2012.\9\ According to 
FPS officials, on March 30, 2012, Argonne National Laboratory delivered 
this tool, called the Modified Infrastructure Survey Tool (MIST), to 
FPS on time and within budget. MIST is an interim vulnerability 
assessment tool that FPS plans to use until it can develop a permanent 
solution to replace RAMP. According to MIST project documents and FPS 
officials, among other things, MIST will:
---------------------------------------------------------------------------
    \9\ As of March 2012, FPS's total life cycle cost for MIST was 
estimated at $5 million.
---------------------------------------------------------------------------
   allow FPS's inspectors to review and document a facility's 
        security posture, current level of protection, and recommend 
        countermeasures;
   provide FPS's inspectors with a standardized way for 
        gathering and recording facility data; and
   allow FPS to compare a facility's existing countermeasures 
        against the Interagency Security Committee's (ISC) 
        countermeasure standards based on the ISC's predefined threats 
        to Federal facilities (e.g., blast-resistant windows for a 
        facility designed to counter the threat of an explosive device) 
        to create the facility's vulnerability report.\10\
---------------------------------------------------------------------------
    \10\ The ISC is comprised of representatives from more than 50 
Federal agencies and departments, establishes standards and best 
practices for Federal security professionals responsible for protecting 
non-military Federal facilities in the United States. FPS is a member 
agency of the Interagency Security Committee in the Department of 
Homeland Security, along with other Federal agencies such as the 
General Services Administration, the Federal Aviation Administration, 
the Environmental Protection Agency, and other components within the 
Department of Homeland Security. The ISC has defined 31 different 
threats to Federal facilities including vehicle-borne improvised 
explosive devices, workplace violence, and theft.
---------------------------------------------------------------------------
    According to FPS officials, MIST will provide several potential 
improvements over FPS's prior assessment tools, such as using a 
standard way of collecting facility information and allowing edits to 
GSA's facility data when FPS inspectors find it is inaccurate. In 
addition, according to FPS officials, after completing a MIST 
vulnerability assessment, inspectors will use additional threat 
information gathered outside of MIST by FPS's Threat Management 
Division as well as local crime statistics to identify any additional 
threats and generate a threat assessment report. FPS plans to provide 
the facility's threat and vulnerability reports along with any 
countermeasure recommendations to the Federal tenant agencies.
    In May 2012, FPS began training inspectors on MIST and how to use 
the threat information obtained outside MIST and expects to complete 
the training by the end of September 2012. According to FPS officials, 
inspectors will be able to use MIST once they have completed training 
and a supervisor has determined, based on professional judgment, that 
the inspector is capable of using MIST. At that time, an inspector will 
be able to use MIST to assess level I or II facilities.\11\ According 
to FPS officials, once these assessments are approved, FPS will 
subsequently determine which level III and IV facilities the inspector 
may assess with MIST.
---------------------------------------------------------------------------
    \11\ FPS uses the ISC's Facility Security Level Determination for 
Federal Facilities to determine the facility security level (FSL). The 
ISC recommends that level I and II facilities be assessed every 5 years 
and level III and IV facilities every 3 years. According to the ISC's 
criteria, a level I facility may be 10,000 or fewer square feet, have 
fewer than 100 employees, provide administrative or direct service 
activities, and have little to no public contact; a level II facility 
may be 100,000 or fewer square feet, have 250 or fewer employees, be 
readily identifiable as a Federal facility, and provide district or 
State-wide services; a level III facility may be 250,000 or fewer 
square feet, have 750 or fewer employees, be an agency's headquarters, 
and be located in an area of moderate crime; and a level IV facility 
may exceed 250,000 square feet, have more than 750 employees, house 
National leadership, and be located in or near a popular tourist 
destination.
---------------------------------------------------------------------------
FPS Increased Its Use of Project Management Best Practices in 
        Developing MIST
    Our preliminary analysis indicates that in developing MIST, FPS 
increased its use of GAO's project management best practices, including 
alternatives analysis, managing requirements, and conducting user 
acceptance testing.\12\ For example, FPS completed, although it did not 
document, an alternatives analysis prior to selecting MIST as an 
interim tool to replace RAMP. It appears that FPS also better managed 
MIST's requirements. Specifically, FPS's Director required that MIST be 
an FSA-exclusive tool and thus helped avoid changes in requirements 
that could have resulted in cost or schedule increases during 
development. In March 2012, FPS completed user acceptance testing of 
MIST with some inspectors and supervisors, as we recommended in 
2011.\13\ According to FPS officials, user feedback on MIST was 
positive from the user acceptance test, and MIST produced the necessary 
output for FPS's FSA process. However, FPS did not obtain GSA or 
Federal tenant agencies' input in developing MIST's requirements. 
Without this input, FPS's customers may not receive the information 
they need to make well-informed countermeasure decisions.
---------------------------------------------------------------------------
    \12\ GAO-11-705R.
    \13\ GAO-11-705R.
---------------------------------------------------------------------------
MIST Has Limitations as an Assessment Tool
    FPS has yet to decide what tool, if any, will replace MIST, which 
is intended to be an interim vulnerability assessment tool. According 
to FPS officials, the agency plans to use MIST for at least the next 18 
months. Consequently, until FPS decides what tool, if any, will replace 
MIST and RAMP, it will still not be able to assess risk at Federal 
facilities in a manner consistent with NIPP, as we previously 
mentioned. Our preliminary work suggests that MIST has several 
limitations:
   Assessing Consequence.--FPS did not design MIST to estimate 
        consequence, a critical component of a risk assessment. 
        Assessing consequence is important because it combines 
        vulnerability and threat information to evaluate the potential 
        effects of an adverse event on a Federal facility. Three of the 
        four risk assessment experts we spoke with generally agreed 
        that a tool that does not estimate consequences does not allow 
        an agency to fully assess the risks to a Federal facility. 
        However, FPS officials stated that incorporating consequence 
        information into an assessment tool is a complex task. FPS 
        officials stated that they did not include consequence 
        assessment in MIST's design because it would have required 
        additional time to develop, validate, and test MIST. As a 
        result, while FPS may be able to identify a facility's 
        vulnerabilities to different threats using MIST, without 
        consequence information, Federal tenant agencies may not be 
        able to make fully-informed decisions about how to allocate 
        resources to best protect Federal facilities. FPS officials do 
        not know if this capability can be developed in the future, but 
        they said that they are working with the ISC and DHS's Science 
        and Technology Directorate to explore the possibility.
   Comparing Risk Across Federal Facilities.--FPS did not 
        design MIST to present comparisons of risk assessment results 
        across Federal facilities. Consequently, FPS cannot take a 
        comprehensive approach to managing risk across its portfolio of 
        9,000 facilities to prioritize recommended countermeasures to 
        Federal tenant agencies. Instead, FPS takes a facility-by-
        facility approach to risk management where all facilities with 
        the same security level are assumed to have the same security 
        risk, regardless of their location.\14\ We reported in 2010 
        that FPS's approach to risk management provides limited 
        assurance that the most critical risks at Federal facilities 
        across the country are being prioritized and mitigated.\15\ FPS 
        recognized the importance of having such a comprehensive 
        approach to its FSA program when it developed RAMP and FPS 
        officials stated that they may develop this capability for the 
        next version of MIST.
---------------------------------------------------------------------------
    \14\ GAO-10-142.
    \15\ GAO, Homeland Security: Addressing Weaknesses with Facility 
Security Committees Would Enhance Protection of Federal Facilities, 
GAO-10-901 (Washington, DC: August 5, 2010).
---------------------------------------------------------------------------
   Measuring Performance.--FPS has not developed metrics to 
        measure MIST's performance, such as feedback surveys from 
        tenant agencies. Measuring performance allows organizations to 
        track progress toward their goals and, gives managers critical 
        information on which to base decisions for improving their 
        programs. This is a necessary component of effective 
        management, and should provide agency managers with timely, 
        action-oriented information.\16\ Without such metrics, FPS's 
        ability to improve MIST will be hampered. FPS officials stated 
        that they are planning to develop performance measures for 
        MIST, but did not give a time frame for when they will do so.
---------------------------------------------------------------------------
    \16\ GAO, Homeland Security: The Federal Protective Service Faces 
Several Challenges That Hamper its Ability to Protect Federal 
Facilities, GAO-08-683 (Washington, DC: June 11, 2008).
---------------------------------------------------------------------------
         fps faces challenges in overseeing its contract guards
    Our work to date indicates that FPS does not have a comprehensive 
and reliable system to oversee its approximately 12,500 contract 
guards. In addition to conducting FSAs, FPS developed RAMP as a 
comprehensive system to help oversee two aspects of its contract guard 
program: (1) Verifying that guards are trained and certified to be on 
post in Federal facilities; and (2) conducting and documenting guard 
post inspections.\17\ However, FPS experienced difficulty with RAMP 
because the contract guard training and certification information in 
RAMP was not reliable. Additionally, FPS faced challenges using RAMP to 
conduct and document post inspections.\18\ For example, FPS inspectors 
we interviewed reported they had difficulty connecting to RAMP's 
servers in remote areas and that recorded post inspections disappeared 
from RAMP's database without explanation. Although we reported some of 
these challenges in 2011, FPS did not stop using RAMP for guard 
oversight until June 2012 when the RAMP operations and maintenance 
contract was due to expire.
---------------------------------------------------------------------------
    \17\ A post is a guard's area of responsibility in a Federal 
facility.
    \18\ FPS's inspection requirement for level I and II facilities is 
two annual inspections of all posts, all shifts. The inspection 
requirement for level III facilities is biweekly inspections of two 
posts, any shift, and for level IV, weekly inspections of two posts, 
any shift.
---------------------------------------------------------------------------
    In the absence of RAMP, in June 2012, FPS decided to deploy an 
interim method to enable inspectors to record post inspections. FPS 
officials said this capability is separate from MIST, will not allow 
FPS to generate post inspection reports, and does not include a way for 
FPS inspectors to check guard training and certification data during a 
post inspection. FPS officials acknowledged that this method is not a 
comprehensive system for guard oversight. Consequently, it is now more 
difficult for FPS to verify that guards on post are trained and 
certified and that inspectors are conducting guard post inspections as 
required.
    Although FPS collects guard training and certification information 
from the companies that provide contract guards, it appears that FPS 
does not independently verify that information. FPS currently requires 
its guard contractors to maintain their own files containing guard 
training and certification information and began requiring them to 
submit a monthly report with this information to FPS's regions in July 
2011.\19\ To verify the guard companies' reports, FPS conducts monthly 
audits. As part of its monthly audit process, FPS's regional staff 
visits the contractor's office to select 10 percent of the contractor's 
guard files and check them against the reports guard companies send FPS 
each month. In addition, in October 2011, FPS undertook a month-long 
audit of every guard file to verify that guards had up-to-date training 
and certification information for its 110 contracts across its 11 
regions. FPS provided preliminary October 2011 data showing that 1,152 
(9 percent) of the 12,274 guard files FPS reviewed at that time were 
deficient, meaning that they were missing one or more of the required 
certification document(s). However, FPS does not have a final report on 
the results of the Nation-wide audit that includes an explanation of 
why the files were deficient and whether deficiencies were resolved.
---------------------------------------------------------------------------
    \19\ For example, guard training and certifications include 
firearms qualification, cardiopulmonary resuscitation, first aid, baton 
certification, and X-ray and magnetometer training.
---------------------------------------------------------------------------
    FPS's monthly audits of contractor data provide limited assurance 
that qualified guards are standing post, as FPS is verifying that the 
contractor-provided information matches the information in the 
contractor's files. We reported in 2010 that FPS's reliance on 
contractors to self-report guard training and certification information 
without a reliable tracking system of its own may have contributed to a 
situation in which a contractor allegedly falsified training 
information for its guards.\20\ In addition, officials at one FPS 
region told us they maintain a list of the files that have been audited 
previously to avoid reviewing the same files, but FPS has no way of 
ensuring that the same guard files are not repeatedly reviewed during 
the monthly audits, while others are never reviewed. In the place of 
RAMP, FPS plans to continue using its administrative audit process and 
the monthly contractor-provided information to verify that qualified 
contract guards are standing post in Federal facilities.
---------------------------------------------------------------------------
    \20\ GAO, Homeland Security: Federal Protective Service's Contract 
Guard Program Requires More Oversight and Reassessment of Use of 
Contract Guards, GAO-10-341 (Washington, DC: April 13, 2010).
---------------------------------------------------------------------------
    We plan to finalize our analysis and report to the Chairman in 
August 2012, including recommendations. We discussed the information in 
this statement with FPS and incorporated technical comments as 
appropriate. Chairman Lungren, Ranking Member Clarke, and Members of 
the subcommittee, this completes my prepared statement. I would be 
happy to respond to any questions you may have at this time.

    Mr. Lungren. Thank you very much, Mr. Goldstein.
    The Chairman now recognizes Dr. Peerenboom to testify.

  STATEMENT OF JAMES P. PEERENBOOM, DIRECTOR, INFRASTRUCTURE 
ASSURANCE CENTER, ASSOCIATE DIRECTOR, DECISION AND INFORMATION 
         SCIENCES DIVISION, ARGONNE NATIONAL LABORATORY

    Mr. Peerenboom. Good morning. Thank you, Chairman Lungren, 
Representative Clarke, and the Members of the subcommittee for 
your invitation to testify here today.
    In early October 2011 the Federal Protective Service 
engaged Argonne by funding the development of a software 
application called a Modified Infrastructure Survey Tool, or 
MIST, to be used by FPS on an interim basis to conduct facility 
security assessments. MIST uses a tailored set of questions 
that helps FPS establish a security baseline and allows for 
comparisons of facilities being surveyed against security 
standards. The MIST provides a standardized way of collecting 
and reporting facility information to inform decisions about 
security measures.
    Argonne's work involved five tasks: Working with FPS to 
develop the MIST methodology; implementing the methodology as a 
release called MIST Release 1.0; developing a host site for 
MIST Release, called the FPS Gateway; assisting FPS, as 
requested, in training functions; and finally, providing help 
desk support to MIST operation.
    By working closely with FPS inspectors, contract management 
staff, and leadership throughout the period of performance 
Argonne was able to meet all the defined requirements in the 
statement of work. MIST Release 1.0 and the FPS Gateway were 
delivered to FPS on March 30, 2012, 6 months after the program 
began. The products were delivered on time and within the 
defined budget.
    Argonne greatly appreciates the opportunity to work with 
FPS in a collaborative manner to develop the MIST as a useful 
and usable interim tool for FPS personnel. Knowledgeable FPS 
leadership and staff were actively involved in all tasks and 
feedback was provided by FPS personnel in a timely manner to 
guide development activities. In addition, regular meetings 
were held with FPS director, Director Patterson, and his staff 
to review schedules and deliverables and to ensure that any 
problems encountered were identified and quickly resolved.
    Finally, Argonne also wishes to thank the DHS Office of 
Infrastructure Protection, part of NPPD, their Protective 
Security Coordination Division in particular, for their 
collaboration with FPS, willingness to share methodologies, 
technology, and experience.
    I appreciate this opportunity to summarize the MIST 
development activities at Argonne and I look forward to your 
questions. Thank you.
    [The prepared statement of Mr. Peerenboom follows:]
               Prepared Statement of James P. Peerenboom
                             July 24, 2012
    Thank you Chairman Lungren, Representative Clarke, and the 
distinguished Members of the subcommittee for your invitation to 
testify here today.
    My name is James Peerenboom, and I am the Director of the 
Infrastructure Assurance Center and the Associate Director of the 
Decision and Information Sciences Division at Argonne National 
Laboratory. Argonne is located just outside of Chicago and is one of 
the U.S. Department of Energy's largest National laboratories for 
scientific and engineering research. Argonne has been providing 
technical support to the U.S. Department of Homeland Security (DHS) 
since the Department was established in March 2003.
                               background
    In late March 2011, the Federal Protective Service (FPS) requested 
a meeting with Argonne to discuss the potential for leveraging 
technical work that had been underway at the laboratory since 2007. The 
work that FPS was seeking to leverage was funded by the DHS National 
Protection and Programs Directorate's Office of Infrastructure 
Protection (NPPD/IP). Specifically, FPS was interested in exploring the 
option to modify an existing survey tool that Argonne had developed for 
NPPD/IP called the Infrastructure Survey Tool (IST). This security 
survey has been successfully deployed and used by DHS and its 
Protective Security Advisors (PSAs) to identify security measures at 
various critical infrastructure assets across the Nation. Argonne first 
met with FPS representatives in April 2011 to demonstrate IST 
functionality; discuss the purpose, scope, and limitations of the tool; 
and discuss FPS assessment needs. A series of subsequent discussions 
and meetings with FPS took place from April through September 2011.
                           description of ist
    The IST is a survey tool that employs a tailored set of questions 
to identify for infrastructure owners and operators some of the 
potential security weaknesses at a given facility, establish an index 
value of protective measures at the facility, and provide comparisons 
with similar facilities. It is not a vulnerability or risk assessment 
tool. Rather, as a survey tool, the IST provides a consistent, 
transparent, and integrated assessment of a facility's current security 
posture. It was designed for application to many types of critical 
infrastructure assets--from refineries, railroad lines, and power 
plants to financial centers--to enable owners and operators to see how 
the security measures at their facilities stack up against those at 
facilities like theirs. While the IST is not intended to compare a 
facility's security to specific standards, it does provide a 
comparative measure to similar facilities.
    The DHS customers for IST survey data are infrastructure owners and 
operators. The survey data, presented in an interactive dashboard, 
allows them to visualize how certain security-related changes, such as 
adding security cameras or installing fencing, alters the protective 
measures index value and may contribute to improved security. On the 
basis of feedback from the PSA community, the interactive dashboard in 
use by NPPD/IP has been well received by infrastructure owners and 
operators. In addition to providing insight and valuable feedback to 
owners and operators, the IST data are also used by DHS to benchmark 
security measures, identify protective measure gaps, and develop 
infrastructure protection strategies.
                             fps work scope
    In early October 2011, FPS engaged Argonne by funding the 
development of a software application, called the Modified 
Infrastructure Survey Tool (MIST), to be used by FPS on an interim 
basis to conduct facility security assessments. As the name implies, 
the MIST is a modification of the existing IST developed by Argonne and 
deployed by NPPD/IP. The MIST uses a tailored set of questions that 
helps FPS establish a security baseline and allows for comparison of 
the facility being surveyed against security standards. MIST's 
methodology involves the gathering of data via an assessment question 
set, processing the data through an algorithm to convert the data to 
vulnerability measures, and the generation of outputs such as a report 
of those measures. Although the MIST was not designed to be an 
Interagency Security Committee (ISC)-compliant tool, it adheres to the 
ISC process and guidance as much as possible and captures elements of 
ISC standards. The MIST provides a standardized way of collecting and 
reporting facility information to inform decisions about security 
measures.
    Argonne's work was funded through an existing Interagency Agreement 
(IAA) with NPPD/IP that encompassed IST-related tasks. Funds were 
committed under the IAA to develop, test, deliver, and support MIST 
Release 1.0. More than half of the funds were used for hardware and 
software to establish a web portal, called the FPS Gateway, that allows 
for sharing of information products and knowledge in real time. The FPS 
Gateway leverages the architecture and hardware/software technology of 
the Linking Encrypted Network System (LENS), a similar portal that 
Argonne developed for NPPD/IP.
    Argonne's statement of work under the IAA with FPS included five 
tasks, all of which involved leveraging the experience, expertise, and 
technology used in developing the IST:
   Working with FPS to develop the MIST methodology;
   Implementing the methodology as MIST Release 1.0 (software 
        development);
   Developing a host site for MIST Release 1.0 (i.e., the FPS 
        Gateway);
   Assisting FPS, as requested, in training functions; and
   Providing ``help desk'' support for MIST operation.
                            project results
    By working closely with FPS inspectors, contract management staff, 
and leadership throughout the period of performance, Argonne was able 
to meet all defined requirements in the statement of work. MIST Release 
1.0 and the FPS Gateway were delivered to FPS on March 30, 2012. The 
products were delivered on time and within the defined budget. Argonne 
continues to provide help desk support to FPS. Feedback from FPS about 
the MIST as an interim survey tool has been very positive.
                            acknowledgments
    Argonne appreciates the opportunity to work with FPS in a 
collaborative manner to develop the MIST as a useful and usable interim 
tool for FPS personnel. Knowledgeable FPS leadership and staff were 
actively engaged in all tasks, and feedback was provided by FPS 
personnel in a timely manner to guide development. In addition, regular 
meetings with the FPS Director also were held to review schedules and 
deliverables and to ensure that any problems encountered were 
identified and quickly resolved. Argonne also wishes to thank the NPPD/
IP Protective Security Coordination Division staff for their 
collaboration with FPS, willingness to explain and share methodologies 
and technology, and thorough IAA oversight.

    Mr. Lungren. Thank you very much.
    I think we may have set a record for brevity of the three 
panelists, and we appreciate that. I am sure all my colleagues 
have questions. We will start of round of questioning, and I 
will start with the first 5 minutes.
    General Patterson, in your previous jobs, precision, 
accuracy, attention to detail has been extremely important. We 
have had concerns prior to the time you got there with the lack 
of those things in some of the functions that you are supposed 
to--that your operation is supposed to carry out.
    Last July when you testified you indicated your, I think, 
frustration at where FPS was at that time. So how would you 
assess FPS's progress to address deficiencies in the ability to 
conduct facility security assessments and conduct oversight and 
training of the contract guard program?
    As I am sure you heard Mr. Goldstein, you have seen the 
testimony that he gave. There seems to be some concern that he 
expresses there. How would you judge where you are versus where 
you think you need to be and where you want to be in those 
areas?
    General Patterson. Thank you, sir.
    Well, to begin, we are at the beginning. RAMP unfortunately 
did not produce results that the agency had hoped that it 
would. So after careful review, as you are aware, I made the 
decision that we were no longer going to follow that path and 
develop a new path.
    I spent quite a bit of time with our sister activity 
component within Homeland Security, I.P., to talk about how 
they look at threats, how they look at vulnerability within the 
private and commercial sector, and how we could leverage what 
they do and bring that about as quickly as we can to look how 
we might do that in the Federal sector.
    Once I was able to look across the--at what they were doing 
and some of the things that some of our other partners might--
were doing at the time, because we also looked at systems 
within S&T, and I think GSA also had a system that we were 
evaluating. But at the time I believe that I.P. offered us the 
best product, if you will, for us to move forward. That was 
when I was introduced to Argonne Labs and the work that they 
were doing for I.P. to support I.P.
    I spent quite a bit of time with I.P. and Argonne Labs to 
assess whether or not that would be the right direction for us. 
In fact, that was the right--I believe that it is the right 
direction for us.
    Now, to get to the point of our folks within the GAO 
assessment, it is correct that our MIST tool does not look at 
consequence. However, what we do is we look at vulnerability 
and we look at threat. We do that in a couple of ways.
    In the vulnerability, we collect a lot of data to assess 
and to determine how vulnerable these--our facilities are to 
the threats that are being posed by--in a number of areas, 
whether it be natural disaster, whether it be criminal threat, 
or whether it be from the threat of terrorism.
    I have also developed a very robust activity within FPS 
that looks at the threat picture every day. We have folks who 
are working with the ODNI, the Office of Director of National 
Intelligence, who are working with I&A at DHS, who are working 
with the FBI. I have several folks across the country who are 
working at the JTTFs as well as the fusion centers across the 
country to help us better understand the threat picture as we 
move forward pulling vulnerability and threat together.
    Relative to the consequence piece, each one of the Federal 
agencies has a--what we call a COOP plan. It is a plan as to 
when there is a problem--a disaster or something the must 
respond to--how they will reorganize, how they will 
reconstitute once that event has happened. They also have 
something called an occupational emergency plan that we work 
with them--that they can leverage, and that plan is developed 
when an agency is either--when they have stood up--or when they 
occupy a facility, or as we go in to perform our assessments.
    So we have what we believe to be a fairly robust scenario, 
if you will, of bringing vulnerability, threat, and 
consequences together not necessarily in a single document, but 
in a process, in a plan. So when an assessment is done my MIST 
tool brings me the vulnerability piece; my intelligence folks--
my RIAs, is what we call them, regional intelligence folks, 
bring forth the threat piece, and combine that with the COOP 
plan and the emergency occupant plan to, I think, to bring 
together a fairly robust product and assessment of 
vulnerabilities and threats to our Federal facilities.
    Mr. Lungren. Mr. Goldstein, would you have any comments on 
that?
    Mr. Goldstein. Thank you, Mr. Chairman.
    You know, we were very pleased that FPS has made progress. 
Don't get me wrong, we feel that they have made some progress. 
The development of MIST is certainly a way forward out of the 
past, whether it was from the original tools of FSRS, or 
whether it was through the more recent tools, where they use an 
Excel spreadsheet and then they had the whole RAMP program. 
This is a way forward, and we do believe that by finally having 
a program the inspectors can use where they are not 
subjectively determining vulnerability on their own is 
important. We discussed it in our report.
    But we do think that being able to include consequence 
information, as the National infrastructure program requires, 
is really important. In my opinion----
    Mr. Lungren. Mr. Patterson suggests that COOP, I believe it 
is, or these other elements that their clients have fulfills 
that role. You have a disagreement with that?
    Mr. Goldstein. What I would tell you is I think that you 
can't have a robust program without consequence information 
because what you are doing is essentially telling people that 
you have set the dinner table without telling them what the 
food is going to be----
    Mr. Lungren. No, I understand. I mean, I have always looked 
at risk, you know, that simple equation of threat, 
vulnerability, and consequence. What I was trying to get at is 
Mr. Patterson has suggested, or stated, that he believes that 
you reach that with this other component of information that he 
receives from what I refer to as the clients--you might use 
another term. Is that something you would still quarrel with at 
this point?
    Mr. Goldstein. I don't think it provides agencies and their 
clients the kind of information they need to make robust 
decisions about which countermeasures they are going to adopt 
and which they aren't, which have more priority than others.
    Mr. Lungren. Okay.
    Ms. Clarke.
    Ms. Clarke. Thank you, Mr. Chairman.
    Director Patterson, FPS chose to modify the current Office 
of Infrastructure Protection's infrastructure survey tool for 
its new interim risk assessment tool. What other tools did FPS 
consider and why weren't they selected?
    General Patterson. Yes, ma'am. I don't have the specific 
names of the other tools but there were a couple other tools. I 
know one specifically that was being developed by the Office of 
Science and Technology. The challenge with that particular tool 
was that it was still in the development phase and it was being 
beta tested.
    One of the challenges that I believe that we were going to 
have was that we were not involved in setting the requirements 
for the tool. So therefore, we would had to have started from 
the very beginning to figure out, you know, whether or not our 
requirements were going to be met, and then if they weren't, 
how we were going to incorporate that.
    I felt that I needed to deliver something. We had spent 
time, a bit of time, on RAMP. I felt that we needed to do, to 
move forth quickly to try to do something to ensure that we 
were providing our customers, our clients, an assessment 
product--okay, not just an assessment, but an assessment 
product--and I thought MIST would be the best way to do that.
    Ms. Clarke. How does FPS plan to address the limitations 
that GAO identified for MIST?
    General Patterson. Yes, ma'am. For me, this is about being 
a marathon and not a sprint. We are going to work aggressively 
with the ISC, the Interagency Security Committee, to look at 
how we productively and efficiently and effectively incorporate 
all those things that the GAO has recommended and we agree that 
should be considered to be in the tool.
    Part of the challenge that we have is that we need to look 
at this very, if you will, judiciously. When we evaluate or 
assess a facility sometimes there are 10 tenants in that 
facility, okay, so we have to be--we have to ensure that when 
we produce a report that the consequence piece of that, if you 
will, is going to have relevance to all of the folks in that 
particular facility.
    So I am not exactly sure that trying to put a consequence 
piece into every assessment is the right avenue. So we are 
going to work with the ISC to see how we might develop that and 
work forward and move in that direction.
    Ms. Clarke. How was the decision made to award Argonne 
National Laboratory the contract to develop MIST? Were there 
other entities considered as well?
    General Patterson. Yes. We were required to--the 
acquisition process required us to consider other avenues for 
that, and they were--the decision was to go with Argonne.
    Ms. Clarke. Okay.
    Mr. Goldstein, when do you estimate that FPS will have a 
more robust guard oversight tool in place that can track guard 
certification information and offer FPS management with greater 
insight as to whether all of the post inspections that need to 
be conducted are, in fact, occurring?
    Mr. Goldstein. I would judicially say that that is a work 
in progress. I think the Federal Protective Service has 
recognized that there are some vulnerabilities in their 
process.
    They recently stopped, as of June 2012, any use of RAMP for 
that process; it was the last part of RAMP that was being used 
and they notified offices not to be using that anymore. Much of 
the information in that system had never been revalidated from 
the old cert system so there were many problems with it.
    I think it is going to take some time. We have some on-
going work for this committee, taking a look at guard programs, 
and this will be something that we evaluate how others do it 
and try to bring some of that information back to you and to 
FPS to help them as they go forward. It is not a short-term 
project.
    Ms. Clarke. So would you say--yes, I mean, I recognize 
that. But would you say they are just at the advent of----
    Mr. Goldstein. I think they are at the beginning of trying 
to determine what they need and how to independently verify 
certification as well as post inspection, yes, ma'am.
    Ms. Clarke. Okay. How does FPS now track the implementation 
of security countermeasures that are recommended for inclusion 
in the facility security assessments?
    General Patterson. I am sorry, ma'am. Can you repeat that, 
please?
    Ms. Clarke. Yes, sure. How does FPS now track the 
implementation of security countermeasures that are recommended 
for inclusion in the facility security assessments?
    General Patterson. Yes, ma'am. Currently we don't have a 
tracking tool. It is all done manually, if you will, paper. As 
our inspectors go out and interface with the committees, the 
security committees, the facility security committees to 
discuss--or the agencies to discuss what countermeasures might 
be necessary or what--that we might recommend, at that point we 
work with the FSCs to implement those requirements and it is 
documented, but it is documented on paper at this point because 
don't have a digital system, if you will, to account for that.
    Ms. Clarke. Thank you, Mr. Chairman. I yield back.
    Mr. Lungren. Gentlelady yields back.
    Mr. Walberg is recognized for 5 minutes.
    Mr. Walberg. Thank you, Mr. Chairman.
    Thanks to the panel for being here.
    Mr. Goldstein, you have noted that MIST, as an interim 
tool, falls short of providing FPS the ability to do many of 
the things that RAMP was intended to provide. You also noted 
that MIST is neither compliant with DHS's own National 
infrastructure protection plan and the framework that it has 
nor standards developed by the Interagency Security Committee.
    So the question I would initially ask is, why are these 
standards so important?
    Mr. Goldstein. I think the standards are important 
principally because they will create a baseline, but they will 
also allow that baseline to be examined across the host of the 
Government's portfolio. FPS does not have the ability today to 
look at the portfolio of Government properties that it 
protects--some 9,000 GSA buildings--and to determine at various 
levels which of those facilities require the most resources.
    They protect everyone, everything essentially at each level 
in the same way, regardless of where it is and what its 
function is. So therefore we have a very static approach, 
building by building, to protecting our Federal infrastructure 
when resources are obviously very tight, and you can't leverage 
the resources and priorities effectively that way.
    Mr. Walberg. I mean, that being the suggestion then, I 
guess, Mr. Patterson, does FPS believe ISC or NIPP standards 
are important criteria to meet?
    General Patterson. Oh, absolutely, sir. They are important. 
We are baselining those criteria.
    The challenge that we have is right now, is developing, if 
you will, a tool that will bring all that into play----
    Mr. Walberg. But the present tool isn't compliant with any 
of those standards, is it?
    General Patterson. It is not ISC-compliant because it does 
not take into consideration the consequence piece of the 
assessment, okay? However, the tool isn't compliant but our 
process is compliant, okay, and the process----
    Mr. Walberg. Explain that a little further.
    General Patterson. Yes, sir. I will. The tool is no more 
than a product that we provide to our customer. It is a 
snapshot in time of what we believe to be the vulnerability, 
the threat, and in this case, the consequence at a particular 
facility, okay? We discuss each one of those elements at the 
out-brief when we have completed an assessment.
    All right, now, that MIST tool--that MIST product--will not 
cover all three, but that doesn't mean that we haven't covered 
that with our customers, all right? So what we are trying to do 
is we are trying to work with the ISC to develop a product, a 
tool, a product that we can deliver at the end of the day, at 
the end of the assessment that allows them to capture all of 
that into one document. We can't do that today.
    Mr. Walberg. What is the time period you are expecting this 
tool to be developed and then fully implemented?
    General Patterson. In my discussions with the ISC, to their 
knowledge there is no one out there today that has a tool that 
will do that, that has been proven to do that. I understand 
that there might be a few folks out there who think they may 
have a tool to do that, but no one at this point has 
demonstrated that they have an effective tool that brings into 
play vulnerability, threat, and consequence into one document, 
or into a process that will bring all that together and you can 
provide that to our clients.
    So we are working aggressively with GSA, with the ISC, and 
others to look at how we might do that and how the community--
how we can work together with the community to make that 
happen.
    Mr. Walberg. Mr. Goldstein, would you concur with that, 
that there is not a tool capable at this time, or----
    Mr. Goldstein. We haven't looked at that specifically, sir. 
We are doing some work for this committee--just beginning that 
work--taking a look at assessment tools across the Federal 
Government and out in the broader community, and we will 
hopefully be able to report back on that on the near future.
    Mr. Walberg. Okay.
    Mr. Patterson, I understand that MIST was developed as an 
interim tool to replace RAMP. What is FPS's long-term plan to 
replace RAMP and what is the time line for that implementation?
    General Patterson. Yes, sir. The long-term plan is to 
create a tool that is ISC-compliant. I currently don't have a--
I don't have a time line for that.
    Again, we are going to--we are actively working with the 
ISC and collaborating with the ISC. We are actively 
collaborating with GSA to begin to look at how we will do that: 
What is the next step? Because we want to build upon what we 
have at MIST, what we have created with MIST, so that we are 
not recreating every time we decide to develop a new tool or a 
new process. We don't want to recreate that every time.
    So the bottom line is is that we are going to work with the 
ISC and the community to look at how we move forward. I wish I 
could give you a better answer but I don't have a better answer 
at this point until we can collaboratively come together and 
begin to figure out the path forward.
    Mr. Walberg. Well, I see my time has expired.
    Mr. Lungren. Mr. Richmond----
    Mr. Walberg. Thank you, Mr. Chairman.
    Mr. Lungren [continuing]. Is recognized for 5 minutes.
    Mr. Richmond. Mr. Patterson, I guess I need you to make a 
connection for me and monitor the conversation with my 
colleague, and you said that MIST, or whatever you are using 
now, the program does not have consequence in it but your 
process has consequence in it. Did I hear that right?
    General Patterson. Yes.
    Mr. Richmond. I guess I am falling short that if the 
process has consequence in it why can't we develop a tool that 
puts vulnerability, threat, and consequence into one thing? I 
guess I am lost on that. Can you----
    General Patterson. Sure.
    Mr. Richmond. Can you help me on that?
    General Patterson. I am not debating that we can. I am just 
saying that I haven't found a way to do that today.
    My work to this point--our research to this point--has 
taken us through vulnerability and threat, but incorporating 
the consequence piece, as we would have it within the Federal 
sector, is very different than you incorporate consequence 
necessarily into the private sector. So what we are trying to 
do is when we do that we want to make sure that we develop a 
tool that is usable, that has got credibility, and we just 
haven't reached that point yet.
    So when I talk about the consequence piece in the process, 
the process is is that when we sit down and talk with our 
customers and with our clients we talk about their ability to 
reconstitute, their ability to perform if there is an event, 
okay, and there are certain things that they have already done.
    For instance, IRS has a COOP plan. If there is an IRS--if 
there is an event--for instance, the airplane that flew into 
the IRS facility in Austin, Texas a few years ago, well the IRS 
had a way to reconstitute. They knew exactly what they needed 
to do in order to move those functions from that facility to 
another facility, okay?
    So for them it wasn't about us bringing something to them, 
all right? They knew exactly what they wanted to do. They had a 
plan. They have a plan.
    Most Federal agencies have a plan if there is a problem, if 
there is an event that happens that takes them away from their 
facility.
    Mr. Richmond. You said most of them do. Do----
    General Patterson. That is an assumption. I would hope all 
do.
    Mr. Richmond. Okay. I guess that was going to be my next 
question: Do we have a good take on who has and who does not 
have----
    General Patterson. No. We work with every agency--every 
facility, every agency that we do an assessment, we work with 
them on what they call the occupant emergency plan, and that is 
a plan to do just what we are talking about. If there is a 
problem--if it is a natural disaster, if it is a criminal event 
or a terrorism event, what will you do? We go through a myriad 
of scenarios with them as to what they would do. Through every 
assessment we work with every tenant in the facility on that 
plan.
    Mr. Richmond. I remember from the last hearing we talked 
about that there was the inability, or we were not in a 
position to verify the--that the guards that were on post were 
trained and certified. Have we developed something to better 
assess whether they are trained, certified, and present on 
our--in our Federal buildings?
    General Patterson. Yes. What we are doing now--we don't--
clearly we need a better process. Right now it is a pen-and-
paper process for us.
    We were hoping--the agency was hoping that RAMP was going 
to resolve this or help us get a little closer to a better 
solution. When that didn't evolve, when that didn't work, what 
I had directed all of my regions to do is revert back to a 
paper process, if you will, working with--as our PSOs are 
brought on for their time to do work, or when a client--not a 
client, but when our contractors, if you will, when they hire a 
PSO to work there is a package of certifications that each of 
our PSOs must have. That package--those certifications are 
maintained by the contractor.
    However, that information that is contained in those 
certification packages are then forwarded--is then forwarded to 
every one of my regions. So we have on file in our regions, if 
you will, that information.
    Now, the challenge is how often we can get through there 
and continue to recertify that their certifications are up-to-
date. We have 13 certifications in those files that must be 
certified every year, or recertified every year. So it is a 
huge administrative task for us to go through that and we are 
looking for ways that we can digitize that, we can use 
technology to help us with that; we are just not there yet.
    Mr. Richmond. I see that my time has expired so I yield 
back. Thank you, Mr. Chairman.
    Mr. Lungren. Thank you.
    We might have time for a quick second round if anybody is 
interested.
    Let me just recognized myself in the first instance, and 
that is, Mr. Goldstein, you heard Mr. Patterson's response to 
the question about consequence. Here is my concern--I will have 
Mr. Patterson answer after I ask your thoughts--when Mr. 
Patterson described it he talked about some of the clients, 
such as IRS, having an ability to reconstitute themselves. That 
is what they have. That is their part of this consequence.
    But I thought this tool that we were trying to develop, or 
tools, to do threat assessment was for the purpose of 
establishing, by FPS, what the levels of security would be so 
that you would have them more in line with what the overall 
risk assessment was. In that regard, a consequence piece would 
help Mr. Patterson and his organization decide the level of 
security as opposed to, as you suggested, I thought, in your 
testimony, that it is kind of an across-the-board, everybody is 
treated the same.
    Am I correct in what you said and the reason why the lack 
of consequence would affect their ability to make those 
decisions?
    Mr. Goldstein. Yes, sir. Mr. Patterson's discussion of COOP 
is an important element of, obviously, responding to any 
disaster or any attack but it isn't directly related, I would 
submit, to what we are talking about, in that the need to have 
consequence information as part of this program, which he 
agrees they will eventually develop and we are simply bringing 
that point out, is so that agencies working with the Federal 
Protective Service will have guidance on how to prioritize 
protecting facilities themselves over a period of time.
    Mr. Lungren. Mr. Patterson, that is what I have found is a 
disconnect in what you are saying. I understand--I am happy 
that IRS knew how to reconstitute itself, but in terms of your 
assessment of your operation's ability to manage your resources 
in tough budget times, to decide where you need to put your 
emphasis, where you need to have more, where you need to have 
less, that that assessment tool or tools are to allow you to do 
that as opposed to you determining exactly what IRS ought to do 
at this place or one of your other clients.
    General Patterson. Yes, sir. Again, it is--from our 
perspective it is a huge challenge as to how we incorporate 
consequence into any tool.
    For instance, as I stated before, every facility is 
different. Some facilities, they are just stand-alone agencies; 
and other facilities, much like the Reagan Building, there 
might be literally 10 to 20 different agencies with different 
requirements--having different requirements, and having much 
more, if you will, at risk than some of the other agencies in 
there.
    So as we look across the spectrum of facilities that we 
have to assess what I am trying to get away from is a one-size-
fits-all kind of a tool.
    Mr. Lungren. I don't want you to do that. That is why I am 
trying to figure out----
    General Patterson. Yes, sir.
    Mr. Lungren [continuing]. Why consequence couldn't be 
incorporated into the tool that you use, or you have some 
integration at some point in time of two tools so that you have 
those three things together in making your risk assessment to 
aid you in a determination of the level of security and the 
prioritizing of your resources. That is all I am trying to 
figure out.
    General Patterson. Yes, sir. Again, it is our intent to 
incorporate consequence; we are just trying to figure out, how 
do we do that?
    Mr. Lungren. Okay. Ms. Clarke.
    Ms. Clarke. Thank you, Mr. Chairman.
    This question is for Director Patterson and Mr. Goldstein: 
How does FPS track the effectiveness and performance of the 
security countermeasures that it has recommended? How do you 
actually----
    General Patterson. We have our inspectors who visit our 
sites routinely, who visit Federal facilities routinely to 
assess the effectiveness of our PSOs. When we do post 
inspections that is an assessment of our contract guard force.
    We also visit our camera facilities to look at whether or 
not they are operating, and when they are not to look, and 
working with the FSC to get them repaired. So this is on an on-
going and continual basis, looking at all of our 
countermeasures on a routine basis to ensure that they are 
operating efficiently and effectively.
    Ms. Clarke. Would you say it is a cyclical type of regimen 
that your inspectors are engaged in? Because I would imagine 
when you look at various facilities the landscape around those 
facilities may change from time to time with infrastructure 
changes, with----
    General Patterson. Right. I mean, you know, we can--we--
from time to time we will have different tenants who move in 
who have different requirements, or they, like, as you just 
stated, ma'am, where there are facilities that may come up next 
to or where we have to assess whether or not--what that impact 
might be on a bus station, let's say, moving in next to one of 
our facilities. So absolutely.
    But that is a continuing process for us. We don't wait for 
the assessment period to do that. If, in fact, we know that the 
city is building--has new construction going up to one of our 
GSA facilities we engage immediately with GSA and the tenant to 
find out what--and the city--to find out what is going up and 
what the impact might be, and what we may need to do to answer 
the--to see if there is going to be an additional security 
standard that we may have to set out as a result of that.
    Ms. Clarke. Is there, baked into the MIST system, a way of 
keeping track of that information?
    General Patterson. I am sorry. Let me--is there going to be 
a way----
    Ms. Clarke. Yes, of, you know--over time you are going to 
maybe have overlays----
    General Patterson. Yes. Yes. Our MIST system, yes, as MIST 
is rolled out and as we are incorporating all that information, 
yes, ma'am, that all will be digitized into MIST so we can go 
back immediately and determine, you know, what systems are 
there and then how we need to correct, or adjust, or whatever 
we need to do to those systems, yes.
    Ms. Clarke. Dr. Peerenboom, what capabilities, if any, 
would a more permanent tool have over FPS's interim MIST tool?
    Mr. Peerenboom. Well, as stated by Director Patterson and 
Mr. Goldstein, MIST is not a risk tool. It focuses on 
vulnerabilities. But it was based on work done for the Office 
of Infrastructure Protection at DHS, the infrastructure survey 
tool. That provides a platform or basis by which one could 
expand.
    In fact, within I.P. they are looking at single assessment 
methodologies to pull together tools and capabilities that 
address risk in a holistic fashion to inform decisions about 
security investments. The customers of Office of Infrastructure 
Protection are slightly different; they are the owners and 
operators. The IST tool that we developed and modified for FPS 
is applicable to all 18 critical infrastructures, so it has a 
broader base.
    But the subset of questions and things that apply to 
Federal facilities is what was done for MIST.
    Ms. Clarke. What makes these capabilities necessary?
    Mr. Peerenboom. The Office of Infrastructure Protection has 
a mission to provide protection and risk analysis for critical 
infrastructure, and so their sets of tools are designed to 
encompass that broad spectrum. The IST that we developed MIST 
from addresses part of the equation, and there are efforts 
underway to expand that base within Office of Infrastructure 
Protection. It provides a point of leverage for FPS should they 
decide to use that.
    Ms. Clarke. So when the risk or the vulnerabilities seem to 
be evolving, how do--how effective is the MIST tool, in terms 
of indicating for FPS what new measures need to be taken? Is it 
dynamic, in other words?
    Mr. Peerenboom. Well, that is really--I should let Director 
Patterson speak to that issue, but MIST provides a basis for 
looking at the vulnerabilities to the facility and the 
inspectors can add in their recommendations and their 
understanding of the consequences of protective measures that 
would--not consequences, excuse me--the countermeasures that 
would be applicable to that facility.
    The MIST tool is partly compliant with the ISC standards 
but it is not an ISC-compliant tool. But we certainly took that 
into account, and over time, should FPS decide to do that, 
technically it is possible to address those standards.
    Ms. Clarke. All right. Thank you.
    Mr. Lungren. Mr. Walberg.
    Mr. Walberg. Thank you, Mr. Chairman.
    Drilling down in the same board again, Mr. Peerenboom, can 
MIST be developed to capture consequence? Is it capable?
    Mr. Peerenboom. Technically the answer is yes.
    Mr. Walberg. Go a little further on why you would say 
technically the answer is yes.
    Mr. Peerenboom. Well, there are capabilities, as I 
indicated earlier, that are being developed within the Office 
of Infrastructure Protection, to enhance the capabilities of 
the infrastructure survey tool that provides the basis that 
MIST was developed on, and we have the capabilities to 
incorporate elements of consequence, but that is a decision 
that obviously is not ours. But technically it is feasible.
    Mr. Walberg. It is feasible, but would you say it is not 
the best tool?
    Mr. Peerenboom. It depends on requirements. No, I didn't 
say that.
    Mr. Walberg. Okay. Okay. Thank you.
    Mr. Patterson, I would applaud you and commend you for 
putting an emphasis on training in your tenure at FPS, and I 
agree that training is a key for your force's morale and 
effectiveness in the process.
    Last summer you stated that you were looking at different 
ways FPS may be able to deliver X-ray and magnetometer and 
weapons training. I understand there has been significant 
dialogue and outreach between FPS and the private sector, which 
may be able to better deliver the training.
    Could you enlighten us at this point in time on the on-
going dialogue with industry to improve guard training?
    General Patterson. Yes, sir. Well, first of all, one of the 
things that I needed to do was hire a senior deputy director 
for training to--who could focus in on this full-time and not 
be a part-time duty. So I have done that. So now I have someone 
who is looking across the board at all the training within FPS 
full-time.
    Now, as we look at training for our PSO force, we are 
actively working with NASCO, the National Association of 
Security Companies, to work with them and look at how we can 
proliferate training across 13,000 PSOs that support FPS and 
all of our Federal partners. It is a huge task, because when 
you are talking about providing services in 50 States that all 
have different, if you will, training requirements, okay, we 
have to ensure that we are doing it in such a way that we are 
getting the best bang for our buck.
    One of the things in the National Weapons Detection 
Program, in magnetometers and X-ray machines, that I knew that 
we needed to do was to ensure that our inspectors were 
adequately trained, and we have done that--we are doing it. We 
are just about completed all of our training for our inspectors 
for the magnetometers and X-ray machines----
    Mr. Walberg. The additional 8 hours of training that you 
were----
    General Patterson. Yes.
    Mr. Walberg [continuing]. Proposing?
    General Patterson. That is going to be cascaded by our 
inspectors, by a team of our inspectors to the--to our PSO 
force. Working with the--kind of in a deal where we do kind-of 
a trained-to-trainer kind-of a thing as well so that we can 
also work with our--within the contractor force, within the 
contractor structure to, in such, certify our contractors so 
that they can provide some of the training, as well.
    Mr. Walberg. You feel that FPS is capable of delivering 
consistent training across, as you say, the 50 States and the 
uniqueness of each of those?
    General Patterson. Yes, sir. Absolutely.
    Mr. Walberg. Mr. Goldstein, would you concur with that?
    Mr. Goldstein. We remain concerned, sir, because the 
problem that brought on the need for the additional training is 
now more than 3 years old when GAO was able to bring bomb-
making materials into 10 Federal facilities without anyone 
knowing and building those bombs. It has been 3 years, and the 
contract guards who are there to prevent things like that from 
happening haven't had that additional training in all of that 
time.
    I understand that the agency is resource-constrained, but 
it would seem to me that this would have been a matter of the 
highest priority, sir.
    Mr. Walberg. Within 3 years?
    Mr. Goldstein. Yes, sir.
    Mr. Walberg. Thank you.
    Mr. Lungren. Thank you very much.
    I thank all the Members for their participation.
    I want to thank the witnesses for your valuable testimony. 
The Members of the committee may have some additional questions 
for our witnesses, and so we would ask you to respond to those 
in writing. The hearing record will be held open for 10 days, 
and this subcommittee stands adjourned.
    [Whereupon, at 11:09 a.m., the subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              

    Questions From Chairman Daniel E. Lungren for L. Eric Patterson
    Question 1. In testimony before the House Committee on Homeland 
Security in November 2009, NPPD Under Secretary Rand Beers testified 
that NPPD was conducting a workforce needs analysis for FPS, at the 
request of Secretary Napolitano, to ensure that FPS has ``the right 
resources and staffing levels to match the missions FPS currently 
has.'' Under Secretary Beers further stated that when the results of 
the study were complete, Congress would be notified.
    What were the results of the analysis?
    Answer. The Federal Protective Service (FPS) conducted a workforce 
needs analysis between 2009 and 2010 and the results were used 
internally within the Department of Homeland Security. The results were 
a first step but did not fully meet the needs of the Service. FPS 
currently has a Federally Funded Research and Development Center on 
contract to conduct an activities analysis to refresh the past 
assumptions and requirements so that FPS may evaluate staffing levels 
in future years. FPS will brief the committee on the completion of the 
updated analysis.
    Question 2a. While FPS is taking positive steps to improve the 
standardization and consistency of FPS, there are still concerns that 
FPS operates differently from region to region and lacks consistent 
standards.
    Is consistency throughout the regions a concern of yours?
    Question 2b. What steps are being taken to improve consistency of 
FPS from region to region?
    Question 2c. Is headquarters assignment a prerequisite for 
promotion at FPS, and if not, do you think that would improve 
standardization and consistency of FPS policies?
    Answer. The Federal Protective Service (FPS) is performing an 
activities analysis to understand and document where it should 
introduce or modify policies to increase operational effectiveness and 
reduce risk. Several variables, including geography, law, threat, and a 
specific customer, could warrant differences in operational activities 
across regions. Through FPS's current detailed review of functions and 
activities, it is identifying commonalities and best practices to 
inform uniform National policies where it makes sense to do so. FPS 
would be pleased to provide a detailed briefing on this effort and 
highlight policy and process improvements that are being implemented 
Nation-wide.
    In addition, FPS has taken steps to realign its workforce to 
effectively map personnel resources to program functions. The result of 
this effort was the creation of an Area Management Concept, which 
compartmentalizes reporting for 11 regional-level offices into three 
Field Operations. Each Field Operation, led by a Senior Executive 
Service-level Assistant Director, provides oversight for multiple 
regional offices to help ensure standardization and consistency across 
the service. This area concept is a geographic-based structure that 
streamlines operational reporting through consolidation of information 
channels.
    An assignment to headquarters is not a prerequisite for promotion 
at FPS. The creation of the Area Management Concept, led by three 
Senior Executive Service-level and field-based Assistant Directors, is 
providing standardization and consistency across the service.
  Questions From Ranking Member Yvette D. Clarke for L. Eric Patterson
    Question 1. According to GAO, FPS spent $795 million on its 
contract guards in fiscal year 2011 which represented 90% of the 
agency's procurement budget. How much is FPS obligated to spend on its 
contract guards in fiscal year 2012, and what are the projected 
expenditures for fiscal year 2013?
    Answer. The Federal Protective Service (FPS) obligated $755.6 
million on its guard contracts in fiscal year 2011, which represented 
approximately 91 percent of its total contract obligations. FPS 
projects that it will obligate approximately $764.6 million in this 
program in fiscal year 2012. This projection is based on the known 
fiscal year 2012 obligations to date ($750.9 million as of August, 10, 
2012), plus additional expected obligations through September 30, 2012, 
totaling $13.7 million for recurring guard services and pending 
modifications and/or equitable adjustments under existing contracts. 
FPS projects that it will obligate approximately $784.4 million in 
fiscal year 2013. This projection is based on the estimated escalation 
of the fiscal year 2012 obligation by 2.6 percent, which accounts for 
estimated inflationary factors such as Service Contract Act wage 
adjustments. However, FPS may obligate additional amounts in fiscal 
year 2013 as necessary to account for emerging requirements for 
existing and new customers and any changes that may arise concerning 
guard requirements.
    Question 2. Why is it that as of June 2012, a total of $652,000 was 
spent on MIST, which appears to be useful so far, while RAMP has 
yielded no tangible results after four years and $35 million or more in 
expenditures?
    Answer. The Risk Assessment and Management Program (RAMP) 
experienced significant programmatic and technical issues, primarily 
related to insufficient user involvement in the requirements definition 
and testing of the application, as well as the lack of an approved 
program baseline to control and measure program progress.
    The efforts to develop and field the Modified Infrastructure Survey 
Tool (MIST) have been more successful because the program benefited 
from leveraging an existing software application already in service 
with the Office of Infrastructure Protection. MIST and its development 
addressed the shortcomings experienced within RAMP by instituting 
program management best practices to provide adequate controls on the 
development effort, and ensuring user involvement in the development 
and testing of MIST.
    Question 3. Given that FPS had a June 2012 deadline to decide what 
to do with the data remaining within RAMP, what decision has been made? 
If a decision has yet to be made, what are the next steps?
    Answer. The June 2012 deadline was tied to the expiration of the 
sustainment support contract for the legacy Risk Assessment and 
Management Program (RAMP) application. The expiration of that contract 
does not equate to a loss of data, as the Government owns the rights to 
the software and RAMP is currently installed within the Department of 
Homeland Security (DHS) Data Center 1 production environment.
    The Federal Protective Service (FPS) has examined the data within 
RAMP and identified three major data sets that needed to be retained: 
The RAMP repository, which is a library of historical assessments and 
policy documents; Protective Security Officer (contract guard) 
contracting information; and guard post inspection reports. Data from 
all other modules within RAMP is either resident elsewhere within FPS 
or lacks value due to problems with RAMP functionality.
    FPS has decommissioned RAMP as of July 12, 2012. With user access 
no longer available, the final data set was copied to FPS servers to 
ensure retention of the data. FPS will continue to work to dispose of 
the RAMP application during the fourth quarter of fiscal year 2012 and 
remove the application and all data from the DHS Data Center 1.
  Questions From Ranking Member Yvette D. Clarke for Mark L. Goldstein
    Question 1. How will the security of Federal facilities be affected 
if FPS inspectors and law enforcement security officers are not 
adequately trained to use MIST?
    Answer. The protection of Federal facilities may be significantly 
hampered if FPS's law enforcement security officers do not receive 
training on the Modified Infrastructure Survey Tool (MIST). As we 
reported in August 2012, FPS is not assessing risk at Federal 
facilities but plans to resume assessing Federal facilities 
vulnerabilities with MIST. However, if FPS's law enforcement security 
officers do not receive MIST training and no other alternative 
assessment tool is used, the backlog of facilities not assessed will 
increase significantly. According to FPS data, more than 5,000 
facilities were to be assessed in fiscal years 2010 through 2012.
    Question 2. What tools or options would be available to FPS in the 
event that MIST training is not completed?
    Answer. FPS may be able to use other tools if it cannot use MIST to 
assess Federal facilities. For example, one tool is the Federal 
Security Risk Manager (FSRM), which FPS used from 2000 to 2009. 
However, FPS has experienced problems using FSRM. Another potential 
tool is the Integrated Rapid Visual Screening developed by DHS's 
Science and Technology Directorate (S&T). The IRVS is a risk assessment 
tool that assesses risk using threat, vulnerability, and consequence. 
According to an S&T official, the IRVS is available to FPS at no cost.
    Question 3. Will the implementation of MIST and other FPS 
activities allow for enhanced compliance with the Interagency Security 
Committee standards?
    Answer. FPS has taken some steps to better align MIST with the 
Interagency Security Committee (ISC) standards. For example, MIST uses 
the ISC recommended countermeasures for defined threat scenarios for 
each facility security level.
 Questions From Ranking Member Yvette D. Clarke for James P. Peerenboom
    Question 1. What are the costs associated with developing and 
implementing MIST as the interim replacement for RAMP?
    Answer. Argonne developed the Modified Infrastructure Survey Tool 
(MIST) under an existing Interagency Agreement (IAA) with the U.S. 
Department of Homeland Security National Protection and Programs 
Directorate's Office of Infrastructure Protection (NPPD/IP). Similar 
methodologies and technologies developed by Argonne for NPPD/IP, such 
as the Infrastructure Survey Tool (IST), were leveraged to reduce MIST 
development time, cost, and risk. A total of $850,000 was committed 
under the IAA to build on the foundation established for the IST to 
develop, test, and deliver MIST Release 1.0. More than half of the 
funds were used for hardware and software to establish a web portal, 
called the FPS Gateway, that allows for sharing of information products 
and knowledge in real time. The FPS Gateway leverages the architecture 
and hardware/software technology of the Linking Encrypted Network 
System (LENS), a similar platform that Argonne also developed for NPPD/
IP. Work on the project was initiated on October 3, 2011. Argonne 
delivered MIST Release 1.0 and the FPS Gateway to FPS on March 30, 
2012.
    Question 2. Are there any features within RAMP that can be adapted 
for use with MIST?
    Answer. Argonne was not tasked to evaluate RAMP and its features.
    Question 3. What are the projected costs and time table for the 
completion of MIST?
    Answer. The scope of work for MIST development was completed, and 
MIST Release 1.0 and the FPS Gateway were delivered to FPS, on March 
30, 2012. The products were delivered on time and within the defined 
budget. Future enhancements to MIST, if any, and Argonne's potential 
role in completing such enhancements are unknown.
    Question 4. Do you anticipate any cost overruns with regard to 
MIST?
    Answer. No cost overruns were associated with Argonne's development 
and delivery of MIST Release 1.0 and the FPS Gateway.