recommended reading

Government withholds details on contract to redesign

The redesign of the official stimulus-tracking site so far has produced more secrecy than transparency, according to some project management specialists and open government advocates.

Observers criticized the General Services Administration, which on Wednesday announced it had awarded Hollywood, Md.-based Web services provider Smartronix a contract to upgrade the site, for failing to provide more information about the deal. The announcement included the name of the company, the value of the contract and two quotes from government officials about the forthcoming site's ability to let "taxpayers see where their dollars are being spent."

The makeover will cost taxpayers $9.5 million through January 2010 and as much as $18 million if all options are exercised until January 2014, GSA said. But it did not disclose what those dollars are being spent on or how many other companies competed for the award. Wednesday's release only noted that 59 companies were eligible to bid. As announced in a June 11 presolicitation notice, the contract was restricted to 59 firms that participate in a governmentwide information technology contract program called Alliant.

Paul Brubaker, former administrator of the Transportation Department's Research and Innovative Technology Administration and now senior director with Cisco's Internet Business Solutions Group, said Alliant, which is intended to speed federal purchasing by supplying agencies with a list of prequalified contractors, might have hindered innovation and openness in the case of the award. Alliant contractors must vet and choose their own subcontractors, if they feel they lack certain skills or staff.

This IT award "raises this whole question ... 'Is this the best process that we can use at this time?' " said Brubaker, who helped draft the 1996 Clinger-Cohen Act, the most recent overhaul of IT contracting practices. "The prime [contractors] are essentially acting as gatekeepers to talent [that can help in] addressing the government's most critical problems. I don't understand why we can't open this up a little."

Some observers noted that award-winning Web developers for information delivery sites such as The New York Times are not on Alliant and thus could not propose a solution.

"We've become so prescriptive to get the taxpayer the best deal on the dollar," Brubaker said. "We've really got to take a step back and look at this to see if there is a way to do this that is transparent and allows the best and the brightest to bid as opposed to this artificial gatekeeping."

Open government groups, some of which have asked for contract details through the Freedom of Information Act, say they are frustrated taxpayers cannot see more about how the money will be spent.

"The problem is we haven't seen the contract," said Jerry Brito, co-creator of the unofficial recovery-tracking site, and a senior research fellow at George Mason University's Mercatus Center who specializes in government transparency. "I've e-mailed the contract officers at GSA and have not heard back from them. We don't know what we're paying $9.5 million for. ... What is thing going to do? Is it going to make fries? Until we see the contract, you can't judge."

GSA spokesman Robert Lesino on Friday said the agency is restricted from providing details, including the names of the other bidders and copies of proposals, due to "procurement sensitivity and acquisition regulation."

Lesino pointed out that the June pre-solicitation notice was posted on the Federal Business Opportunities Web site. "In order to expedite the award of the contract, the previously competed Alliant governmentwide acquisition contract was used," he said.

Transparency advocates noted that neither GSA nor the Recovery Accountability and Transparency Board, which maintains, posted the request for proposals on or Nextgov obtained the document from a GSA spokeswoman, shortly after the government issued it to Alliant contractors.

Making available the contract and the number of bids submitted is not the job of the board, said spokesman Ed Pound, adding that GSA handles the public release of contract information.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.