recommended reading

Stimulus watchdog defends Web contract

The government's chief overseer of economic stimulus spending is defending last week's award of an $18 million federal contract to a Maryland-based technology company to overhaul the Web site, which allows the public to monitor the stimulus program.

Earl Devaney, chairman of the Recovery Accountability and Transparency Board, which manages the site and tracks the use of stimulus funds, said Friday in an interview with National Journal Group that critics of the contract's cost have oversimplified the task of rebuilding "the government's largest Web site" in a matter of months, as well as the challenge of putting in place security controls and interconnectivity with a reporting system designed to handle an ocean of data.

The contract was announced Wednesday by the board and the General Services Administration. It calls for spending $9.5 million by January 2010, with options that would boost the value of the contract to $18 million by 2014.

Republican lawmakers quickly began circulating news releases and e-mailed statements ridiculing the size of the contract, and good-government groups bristled at a lack of details about the procurement deal.

Maryland-based Smartronix, Inc. was picked by a GSA-led panel of experts, Devaney said, adding that he did not personally participate in the selection process and had "never heard" of the company before.

The firm is based in the district of House Majority Leader Hoyer, a fact that has fueled some of the criticism.

The new " 2.0" Web site is slated for completion before recipients of stimulus funds begin submitting quarterly spending reports Oct. 10.

Only two other companies - Accenture and SRA - submitted bids for the high-profile overhaul. "I suspect this was such a risky venture that it scared lots of bidders away," Devaney said.

Creating the infrastructure to process a huge volume of information is a daunting task, he added. "We're estimating about 200,000 to 400,000 recipients [of federal stimulus funds] ... and we're asking each one to talk to us about 44 pieces of data," Devaney said.

The new site will display data submitted by states, localities, and contract recipients via a new online interface called The redesign calls for an interactive mapping application that users can manipulate to identify how stimulus money is being used in their communities.

Asked if the October deadline for the project's completion could slide, Devaney shook his head. "It's got to happen" by then, he said.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.