recommended reading

GAO upholds contractor protest of DHS financial system award

The Government Accountability Office this week overturned the Homeland Security Department's award of a departmentwide financial management system to CACI, sources familiar with GAO's decision told Nextgov. GAO spokesman Chuck Young confirmed the agency's decision in an e-mail.

The audit agency is recommending that DHS issue a revised solicitation that better reflects its actual needs, accept modified proposals and conduct a new competition, the sources said.

Global Computer Enterprises, which had provided the Transportation Security Administration and the U.S. Coast Guard with Web-based financial management services, protested the contract award in November 2010, about a week after the department selected CACI for the work. The contract has a potential value of $450 million.

Over the past several years, the financial management system, known as the Transformation and Systems Consolidation program, or TASC, has drawn criticism from lawmakers, the Homeland Security inspector general and incumbent contractors who argued the project was poorly planned. It initially was expected to cost as much as $1 billion. The department intended to transfer existing financial management networks across its agencies to one central operation under TASC.

A July 2010 IG audit found department officials neglected to include all projected expenses in total life cycle-cost estimates for TASC, and had not completed key planning documents or staffing projections. House Democrats appealed directly to the White House to stop the project last summer. As far back as 2008, Savantage Solutions, whose financial management product is used in many DHS agencies, filed a complaint to prevent DHS from soliciting bids for the system.

Last summer, the Office of Management and Budget halted the development of all financial systems governmentwide to let agencies redraw designs for the historically costly and overly complex category of information technology projects. By fall, most agencies had either killed or narrowed the scope of their projects to the most critical functions so they could be deployed incrementally with less risk of failure.

Around this time, DHS announced it had decided to hire CACI for a slimmed-down version of TASC that, adhering to the new OMB rules, would be turned on in phases. Under the 10-year contract period, the project was to be divided into small task orders. DHS had planned to start by shifting the Federal Emergency Management Agency to the new system so that the department could perfect management practices before incorporating other agency networks.

Homeland Security officials were not immediately available to respond. GCE declined to comment.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.