Sentinel Audit III: Status of the Federal Bureau of Investigation’s
Case Management System (Redacted - Public Version)
Audit Report 07-40
Office of the Inspector General
The objectives of this audit were to determine: (1) the status of the Sentinel project, including the FBI’s monitoring of the contractor’s performance during Phase 1; (2) the planning for and progress of Phase 2; and (3) the resolution of remaining concerns identified in our previous two audit reports.
Scope and Methodology
The audit was performed in accordance with the Government Auditing Standards, and included tests and procedures necessary to accomplish the audit objectives. We conducted work at FBI headquarters in Washington, D.C., and at the FBI Sentinel Program Management Office in McLean, Virginia.
To perform our audit, we interviewed officials from the FBI, Office of the Director of National Intelligence (DNI), the Department of Justice, and the Office of Management and Budget. We also interviewed officials from Lockheed Martin and other contractors supporting the PMO. W e reviewed documents related to the Sentinel contract; cost and budget documentation; Sentinel plans, processes and guidelines; prior OIG Sentinel reports; and other reports from the OIG and other agencies on the FBI’s information technology.
To evaluate the FBI’s implementation of the Sentinel contract, we examined the contract as well as associated amendments and documentation, underlying cost estimates, and methodologies for contract modifications. We also examined actual costs, progress toward completion of Phase 1, and planning for Phase 2. Additionally, we interviewed FBI officials responsible for contract implementation.
To update issues identified in the OIG’s December 2006 Sentinel audit report, we interviewed responsible FBI and contractor officials and reviewed plans and procedures for cost tracking, risk management, contingency planning, IV&V, and PMO staffing. We also interviewed FBI officials and obtained the updated status on issues relating to information sharing and EVM.
|« Previous||Table of Contents||Next »|