recommended reading

GAO: Hundreds of federal IT projects are poorly planned and underperforming

More than 400 federal information technology projects valued at $25 billion have been poorly planned or performing under expectations - or both, the Government Accountability Office planned to tell a Senate hearing on Thursday.

Comment on this article in The Forum.GAO identified the projects from the Office of Management and Budget's management watch list and its high-risk list, both of which include IT projects that present agencies with challenges to stay within budget, on time and perform as expected. The agency found 352 projects valued at about $23.4 billion on the management watch list to be poorly planned. Agencies reported 87 of their high-risk projects valued at about $4.8 billion were poorly performing. GAO determined that 26 projects, valued at about $3 billion, were both poorly planned and poorly performing.

The audit office was scheduled to deliver its findings to the Senate's Federal Financial Management, Government Information, Federal Services and International Security subcommittee.

"Today, many agencies in the federal government are being allowed to spend billions of taxpayer dollars on plans that are duplicative, have no clear goals, and are managed by unqualified individuals," subcommittee chairman Sen. Tom Carper, D-Del., wrote in an e-mail. "This is simply unacceptable and it makes me wonder whether it's time for Congress to pull the plug on some of these failed investments."

While there has been improvement in how projects are identified for the lists since September 2007, "more needs to be done by both OMB and the agencies to address recommendations GAO has previously made to improve the planning, management and oversight of poorly planned and performing projects so that potentially billions in taxpayer dollars are not wasted," the watchdog agency said.

OMB has yet to publicly disclose the performance shortfalls that lead the agency to classify projects as high risk, according to the report.

GAO also noted that 48 percent of the government's major IT projects have experienced cost, schedule and performance goals changes - a process known as rebaselining. The purpose of rebaselining is to ensure that project managers have realistic benchmarks for tracking the status of a project. While the practice can be done for valid reasons - such as changing a project's scope, requirements or funding stream -- it also can be used to mask cost overruns and delays.

Fifty-one percent of projects were rebaselined at least twice and 11 percent were rebaselined four times or more, which indicates serious problems with planning, GAO reported. The agency recommended that OMB issue guidance for rebaselining policies.

Carper also announced plans to introduce legislation along with Sen. Susan Collins, R-Maine, that will make agencies report significant deviations on cost, schedule and performance in IT projects. The legislation states that agencies may not have the skills needed to manage complex IT investments, and calls for the creation of an "IT strike force," composed of specialists inside and outside of government that agencies can use as a resource before a project spirals out of control.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.