Acquisition Policy - Federal News Network https://federalnewsnetwork.com Helping feds meet their mission. Wed, 19 Jun 2024 18:47:34 +0000 en-US hourly 1 https://federalnewsnetwork.com/wp-content/uploads/2017/12/cropped-icon-512x512-1-60x60.png Acquisition Policy - Federal News Network https://federalnewsnetwork.com 32 32 GSA contracting officers are driving schedule holders crazy https://federalnewsnetwork.com/contracting/2024/06/gsa-contracting-officers-are-driving-schedule-holders-crazy/ https://federalnewsnetwork.com/contracting/2024/06/gsa-contracting-officers-are-driving-schedule-holders-crazy/#respond Wed, 19 Jun 2024 18:01:08 +0000 https://federalnewsnetwork.com/?p=5046328 Contractors on the GSA's multiple-award schedule say contracting officers are trying to re-negotiate contracts and making unreasonable demands for information.

The post GSA contracting officers are driving schedule holders crazy first appeared on Federal News Network.

]]>
var config_5044610 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB7606434967.mp3?updated=1718710317"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"GSA contracting officers are driving schedule holders crazy","description":"[hbidcpodcast podcastid='5044610']nnComplaints are coming from contractors on the General Services Administration's multiple-award schedule. They say contracting officers are trying to re-negotiate finished contracts and making unreasonable demands for information. For more, <a href="https:\/\/federalnewsnetwork.com\/category\/temin\/tom-temin-federal-drive\/" target="_blank" rel="noopener"><em><strong>the Federal Drive with Tom Temin<\/strong><\/em><\/a> talked with federal sales and marketing consultant Larry Allen.nn<strong><em>Interview transcript\u00a0<\/em><\/strong>n<blockquote><strong>Tom Temin\u00a0<\/strong>\u00a0And you have found that this is mainly happening in the information technology part of the Unified Schedules program.nn<strong>Larry Allen <\/strong>That's right. And at the outset, you know, I've worked on the GSA Schedules program for well over 30 years. And we certainly have seen things ebb and flow over that time. But recently, the level of industry discussion on problems, particularly with the IT schedule, has been pointing up close to an all-time high. And it's time to get these issues out in front of people... get a little disinfecting sunshine on them, if you will, so that we have a program that works better not just for contractors, but for government customers.nn<strong>Tom Temin <\/strong>Well, what is happening? What are contracting officers actually doing, that the contractors are complaining about?nn<strong>Larry Allen\u00a0 <\/strong>They're doing several things. I think one of the most notable things, Tom, is that there seems to be no end to the amount of data that contracting officers feel that they are entitled to. Papering the record, just one more set of transactional data, and you know, all of that data...everything a contractor submits, it has to be accurate, current and complete. And the more you're asked to submit, the more, you've got to keep track of everything and make sure you're meeting that standard. And if you're not, then you are setting yourself up for some future potential audit problems, not to mention the paperwork that you're having to provide in an endless stream of requests that come. One of the other things that's happening is -- and you alluded to it in the setup -- and that is (for) contracts that are already in place, GSA has already negotiated it, the contracting officer has found that to be a fair and reasonable price. Six months (or) a year later, a company comes in and asks for a contract modification. And the contracting officer now uses that as an occasion to reopen negotiations on everything and say, 'Well, wait a minute, that maybe wasn't a fair and reasonable price.' And the contractor is left saying, 'Well, wait a minute, this is how I've been selling. I've been doing this for the last year, people enjoy doing business with me this way.' You know, there's only so much blood in the turnip that you can give. And that's an issue too. I think one of the things that every contractor ought to be concerned about as well, Tom is contracting officers asking companies who have their contract set up through GSA's Transactional Data Reporting pilot, for contractor-based sales information. That's not supposed to happen at all. And it's a real danger for me, I think, look, when TDR was set up, I put a blackbox warning out on it on exactly this issue. And since then, things have you know, mitigated a little bit where TDR has proven to be a viable pathway for companies who can't use the traditional method to get on scheduled. But if we're getting into a situation where there's no standard for what constitutes enough data, or how much data because there's not supposed to be any data in the first place, that is a moment that every TDR contractor should wake up and say, 'Stop. What's going on here?'nn<strong>Tom Temin <\/strong>We're speaking with Larry Allen, president of <a href="https:\/\/www.allenfederal.com\/">Allen Federal Business Partners<\/a>. I mean, there are legal restrictions on what the government can ask for -- correct? -- in what are basically totally commercial products. This is not cost plus contracts or development contracts, but simply commercial items available widely.nn<strong>Larry Allen <\/strong>Right. And I think this is one of the disconnects, Tom. First of all, the Paperwork Reduction Act is a rule that even the schedules program has to adhere to, where the government is only supposed to make reasonable data requests. And in fact, GSA has to go out every so often, and renew its authority to collect data from contractors. Usually, that type of request is rubber stamped at the FAR Council. But right now, I don't think it should be. It seems like if it just sales through the rulemaking process, then the idea is that whatever we're asking for is fine, and we're not asking for anything more than we should be. And that's manifestly not the case. Ironically, we're talking about this at a time when GSA is trying to be pro-environment, but there are a lot of trees that are losing their lives to provide the paperwork, the contracting officers want. Are you aware that GSA management is aware of this? And maybe we'll do something to mitigate it... get some word out to their CEOs? Tom, I think they weren't aware of it before this, but they're aware of it now. I know that the schedules program management office is aware of these issues. They've already indicated that they want to have discussions with the contracting officer management team at the IT part of GSA. I think that's a good idea. But I do think it's going to take some senior level intervention here to say, 'Hey, look, this program worked best when it's a partnership. When contractors and GSA work together to serve our common federal customer. This is not a program that works well of contractors have a target on their back.'\u00a0 And just because you're doing $20 billions a year today through this program, from the IT schedule doesn't mean that thus now and forevermore, it shall be. One need look no further, Tom, than the Oasis Plus Program and the fact that Oasis overtook the GSA professional services schedule in terms of sales a couple of years ago. So you can actually kill the goose that lays the golden egg.nn<strong>Tom Temin <\/strong>All right, well, we'll keep an eye on that one and see what develops. Especially as you say, there's a lot of G wax around that people can use alternatively to the to the schedules. Also your reporting that whistleblower lawsuits are reaching companies in greater frequency, especially to help enforce the cybersecurity regime.nn<strong>Larry Allen <\/strong>That's right, Tom, we'd forecast when all the cybersecurity rules started coming down, that the primary way that they would be enforced would be through whistleblower cases. And we're just starting now to get some evidence that that's actually what's playing out. We had a whistleblower, this time, blowing the whistle against SAIC alleging that on one of their government contracts, they didn't fulfill all the cybersecurity duties they were supposed to adhere to. We don't know whether that's true or not. But what we can say is that once the allegations were made, the contractor in this case acted in a way that is probably not a best practice. You don't solely isolate the employee, you don't take away their rights, you don't fire them for blowing the whistle. There are FAR rules on that type of stuff. And you can actually make the situation worse for yourself. Because now instead of just having to defend against the cybersecurity allegations, you've got a retaliation suit that you're gonna have to settle as well. So it's just really full employment for your legal staff.nn<strong>Tom Temin <\/strong>Yeah. So, what's your best advice for companies then, besides making sure the cyber procedures are in place that are required to start with?nn<strong>Larry Allen <\/strong>Well, I think at a basic level, if you have whistle -- every company has, on paper anyway, whistleblower protections. Those whistleblower protections actually have to be operational. It's nice to have them on a piece of paper, it's nice to have them in a policy document, but they actually have to be lived. And don't fear the people who blow the whistle. Look if, at a minimum, if you'd listened to the whistleblower in this case, you would have an opportunity to know whether or not the allegations were valid or not. Now you've got lawyers involved and the Department of Justice, it's going to cost you a lot of money, it's probably going to cost at least one person, their job in the company. And you didn't need to do it. So, my advice is to relax, work through it, follow the rules that you're supposed to follow. They're there for a reason. And they can actually save you some time and aggravation.nn<strong>Tom Temin <\/strong>I guess that's our theme today. Stay within your guidelines and your lanes of travel, whether you're government or industry.nn<strong>Larry Allen <\/strong>I think that's a good takeaway. These things exist for a reason and they help make sure that we have a good government market. And that's really what the outline is. We want to be able to have the business of government run smoothly.<\/blockquote>"}};

Complaints are coming from contractors on the General Services Administration’s multiple-award schedule. They say contracting officers are trying to re-negotiate finished contracts and making unreasonable demands for information. For more, the Federal Drive with Tom Temin talked with federal sales and marketing consultant Larry Allen.

Interview transcript 

Tom Temin  And you have found that this is mainly happening in the information technology part of the Unified Schedules program.

Larry Allen That’s right. And at the outset, you know, I’ve worked on the GSA Schedules program for well over 30 years. And we certainly have seen things ebb and flow over that time. But recently, the level of industry discussion on problems, particularly with the IT schedule, has been pointing up close to an all-time high. And it’s time to get these issues out in front of people… get a little disinfecting sunshine on them, if you will, so that we have a program that works better not just for contractors, but for government customers.

Tom Temin Well, what is happening? What are contracting officers actually doing, that the contractors are complaining about?

Larry Allen  They’re doing several things. I think one of the most notable things, Tom, is that there seems to be no end to the amount of data that contracting officers feel that they are entitled to. Papering the record, just one more set of transactional data, and you know, all of that data…everything a contractor submits, it has to be accurate, current and complete. And the more you’re asked to submit, the more, you’ve got to keep track of everything and make sure you’re meeting that standard. And if you’re not, then you are setting yourself up for some future potential audit problems, not to mention the paperwork that you’re having to provide in an endless stream of requests that come. One of the other things that’s happening is — and you alluded to it in the setup — and that is (for) contracts that are already in place, GSA has already negotiated it, the contracting officer has found that to be a fair and reasonable price. Six months (or) a year later, a company comes in and asks for a contract modification. And the contracting officer now uses that as an occasion to reopen negotiations on everything and say, ‘Well, wait a minute, that maybe wasn’t a fair and reasonable price.’ And the contractor is left saying, ‘Well, wait a minute, this is how I’ve been selling. I’ve been doing this for the last year, people enjoy doing business with me this way.’ You know, there’s only so much blood in the turnip that you can give. And that’s an issue too. I think one of the things that every contractor ought to be concerned about as well, Tom is contracting officers asking companies who have their contract set up through GSA’s Transactional Data Reporting pilot, for contractor-based sales information. That’s not supposed to happen at all. And it’s a real danger for me, I think, look, when TDR was set up, I put a blackbox warning out on it on exactly this issue. And since then, things have you know, mitigated a little bit where TDR has proven to be a viable pathway for companies who can’t use the traditional method to get on scheduled. But if we’re getting into a situation where there’s no standard for what constitutes enough data, or how much data because there’s not supposed to be any data in the first place, that is a moment that every TDR contractor should wake up and say, ‘Stop. What’s going on here?’

Tom Temin We’re speaking with Larry Allen, president of Allen Federal Business Partners. I mean, there are legal restrictions on what the government can ask for — correct? — in what are basically totally commercial products. This is not cost plus contracts or development contracts, but simply commercial items available widely.

Larry Allen Right. And I think this is one of the disconnects, Tom. First of all, the Paperwork Reduction Act is a rule that even the schedules program has to adhere to, where the government is only supposed to make reasonable data requests. And in fact, GSA has to go out every so often, and renew its authority to collect data from contractors. Usually, that type of request is rubber stamped at the FAR Council. But right now, I don’t think it should be. It seems like if it just sales through the rulemaking process, then the idea is that whatever we’re asking for is fine, and we’re not asking for anything more than we should be. And that’s manifestly not the case. Ironically, we’re talking about this at a time when GSA is trying to be pro-environment, but there are a lot of trees that are losing their lives to provide the paperwork, the contracting officers want. Are you aware that GSA management is aware of this? And maybe we’ll do something to mitigate it… get some word out to their CEOs? Tom, I think they weren’t aware of it before this, but they’re aware of it now. I know that the schedules program management office is aware of these issues. They’ve already indicated that they want to have discussions with the contracting officer management team at the IT part of GSA. I think that’s a good idea. But I do think it’s going to take some senior level intervention here to say, ‘Hey, look, this program worked best when it’s a partnership. When contractors and GSA work together to serve our common federal customer. This is not a program that works well of contractors have a target on their back.’  And just because you’re doing $20 billions a year today through this program, from the IT schedule doesn’t mean that thus now and forevermore, it shall be. One need look no further, Tom, than the Oasis Plus Program and the fact that Oasis overtook the GSA professional services schedule in terms of sales a couple of years ago. So you can actually kill the goose that lays the golden egg.

Tom Temin All right, well, we’ll keep an eye on that one and see what develops. Especially as you say, there’s a lot of G wax around that people can use alternatively to the to the schedules. Also your reporting that whistleblower lawsuits are reaching companies in greater frequency, especially to help enforce the cybersecurity regime.

Larry Allen That’s right, Tom, we’d forecast when all the cybersecurity rules started coming down, that the primary way that they would be enforced would be through whistleblower cases. And we’re just starting now to get some evidence that that’s actually what’s playing out. We had a whistleblower, this time, blowing the whistle against SAIC alleging that on one of their government contracts, they didn’t fulfill all the cybersecurity duties they were supposed to adhere to. We don’t know whether that’s true or not. But what we can say is that once the allegations were made, the contractor in this case acted in a way that is probably not a best practice. You don’t solely isolate the employee, you don’t take away their rights, you don’t fire them for blowing the whistle. There are FAR rules on that type of stuff. And you can actually make the situation worse for yourself. Because now instead of just having to defend against the cybersecurity allegations, you’ve got a retaliation suit that you’re gonna have to settle as well. So it’s just really full employment for your legal staff.

Tom Temin Yeah. So, what’s your best advice for companies then, besides making sure the cyber procedures are in place that are required to start with?

Larry Allen Well, I think at a basic level, if you have whistle — every company has, on paper anyway, whistleblower protections. Those whistleblower protections actually have to be operational. It’s nice to have them on a piece of paper, it’s nice to have them in a policy document, but they actually have to be lived. And don’t fear the people who blow the whistle. Look if, at a minimum, if you’d listened to the whistleblower in this case, you would have an opportunity to know whether or not the allegations were valid or not. Now you’ve got lawyers involved and the Department of Justice, it’s going to cost you a lot of money, it’s probably going to cost at least one person, their job in the company. And you didn’t need to do it. So, my advice is to relax, work through it, follow the rules that you’re supposed to follow. They’re there for a reason. And they can actually save you some time and aggravation.

Tom Temin I guess that’s our theme today. Stay within your guidelines and your lanes of travel, whether you’re government or industry.

Larry Allen I think that’s a good takeaway. These things exist for a reason and they help make sure that we have a good government market. And that’s really what the outline is. We want to be able to have the business of government run smoothly.

The post GSA contracting officers are driving schedule holders crazy first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/contracting/2024/06/gsa-contracting-officers-are-driving-schedule-holders-crazy/feed/ 0
Lawmakers advance DHS bills to ban Chinese batteries, help TSAers with commute https://federalnewsnetwork.com/acquisition-policy/2024/06/lawmakers-advance-dhs-bills-to-ban-chinese-batteries-help-tsaers-with-commute/ https://federalnewsnetwork.com/acquisition-policy/2024/06/lawmakers-advance-dhs-bills-to-ban-chinese-batteries-help-tsaers-with-commute/#respond Wed, 12 Jun 2024 21:34:25 +0000 https://federalnewsnetwork.com/?p=5038335 The homeland security committee passed a flurry of DHS bills, including several with implications for TSA operations and employees.

The post Lawmakers advance DHS bills to ban Chinese batteries, help TSAers with commute first appeared on Federal News Network.

]]>
The House Homeland Security Committee advanced a raft of new legislation today, including a bill aimed at cutting major Chinese battery manufacturers out of the Department of Homeland Security’s supply chain.

The committee today voted to approve a bill from Rep. Carlos Gimenez (R-Fl.), “Decoupling from Foreign Adversarial Battery Dependence Act.” The bill would block DHS from procuring batteries from six Chinese companies over concerns about human rights abuses, as well as supply chain and cybersecurity concerns.

Under the legislation, the ban would begin on Oct. 1, 2027.

During today’s markup, Gimenez said he had engaged with DHS in developing the legislation over the past two months. “The committee incorporated nearly all of DHS’s inputs,” he said.

Gimenez also said he was expecting a report from DHS within the coming months describing the potential impacts of the proposed ban.

Under the bill, DHS would be able to waive the prohibition if it determines the battery purchases don’t pose a national security risk. DHS would also be able to issue a waiver if there are no viable alternatives.

The latest push targeting major Chinese battery manufacturers comes after the fiscal 2024 defense authorization act included a corresponding ban on the Defense Department buying batteries from the same six companies. The DoD ban will also go into effect on Oct. 1, 2027.

That law, however, gives the Pentagon the ability to waive the limitation for any reason.

TSA commuting legislation

The homeland security committee today also unanimously passed legislation that would explore better compensating Transportation Security Committee employees for the time they spend commuting to the job.

The “TSA Commuting Fairness Act,” introduced by Rep. Tim Kennedy (D-N.Y.), would require TSA to conduct a feasibility study on allowing employees to clock in for work when they arrive at airport parking lots or bus and transit stops. The study would evaluate whether such a program could rely on location data from employees’ phones.

“Doing so would reduce commuting costs and improve quality of life for employees while allowing TSA leadership to manage the workforce appropriately and maintain order and discipline,” Kennedy said during today’s mark-up.

Kennedy referenced how TSA employees typically have to navigate a lengthy secondary commute between airport parking lots and their assigned airport checkpoints. Many have to wait for bus or light rail connections, or they have to walk to the from the lot to the airport. “And if these hardworking Americans are just a few minutes late to clock in, they can face discipline and punishment,” he added.

“This study will help both TSA and Congress gain insight into ways to address these challenges and the potential costs and benefits of pursuing an innovative program along these lines,” Kennedy said.

Digital identity report

The committee also unanimously approved a bill introduced by Rep. Clay Higgins that would require TSA to submit a report on the current state of “digital identity” ecosystems, as well as the value of digital IDs in the transportation sector.

Higgins said he supports TSA’s digital ID initiatives. “It’s also important that we understand the full extent of the risks and benefits of utilizing this technology to advance the agency’s homeland security mission,” he added.

“Using a digital ID is not only more convenient, but also better for ensuring privacy protection as opposed to using conventional physical IDs,” Higgins said. “Digital IDs do not need to be handled by a [transportation security officer].”

TSA has started accepting digital IDs, such as mobile drivers licenses that are stored in a mobile phone’s electronic wallet, at some airport checkpoints. The agency this week announced it would begin accepting New York state-issued mobile drivers licenses at select airports. The announcement brings TSA’s digital ID initiative to nine states and 28 airports so far.

TSA’s work has represented a primary pathfinder in the federal government’s acceptance of digital IDs. Meanwhile, the National Institute of Standards and Technology is considering including mobile drivers licenses and other digital credentials in its revised digital identity guidelines.

The post Lawmakers advance DHS bills to ban Chinese batteries, help TSAers with commute first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/acquisition-policy/2024/06/lawmakers-advance-dhs-bills-to-ban-chinese-batteries-help-tsaers-with-commute/feed/ 0
Coast Guard still struggling with major acquisition programs https://federalnewsnetwork.com/defense-main/2024/05/coast-guard-still-struggling-with-major-acquisition-programs/ https://federalnewsnetwork.com/defense-main/2024/05/coast-guard-still-struggling-with-major-acquisition-programs/#respond Wed, 22 May 2024 18:30:42 +0000 https://federalnewsnetwork.com/?p=5011508 The Coast Guard’s biggest programs, the Offshore Patrol Cutter and the Polar Security Cutter are years behind schedule and billions of dollars over budget.

The post Coast Guard still struggling with major acquisition programs first appeared on Federal News Network.

]]>
var config_5010993 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB7177487460.mp3?updated=1716378842"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Coast Guard still struggling with major acquisition programs","description":"[hbidcpodcast podcastid='5010993']nnThe Navy isn\u2019t the only military service that struggles with big shipbuilding programs. Two of the Coast Guard\u2019s biggest programs \u2014 the Offshore Patrol Cutter and the Polar Security Cutter \u2014 are years behind schedule and billions of dollars over budget. The Government Accountability Office<a href="https:\/\/www.gao.gov\/products\/gao-24-107488"> (GAO) says <\/a>those cost and schedule increases are signs of broader management and oversight problems. For more on the\u00a0<em><strong><a href="https:\/\/federalnewsnetwork.com\/category\/temin\/tom-temin-federal-drive\/">Federal Drive with Tom Temin<\/a><\/strong><\/em>, Federal News Networks Host of On DoD, Jared Serbu talked with Shelby Oakley, GAO's Director for Contracting and National Security Issues.nn<strong><em>Interview Transcript:\u00a0<\/em><\/strong>n<blockquote><strong>Jared Serbu <\/strong>I think it's fair to say the Coast Guard has really had major struggles over the years with these major acquisition programs. I know your recent testimony was focused really on just a couple of those, the offshore patrol cutter and the polar security cutter. So what did those programs sort of tell us about the state of play in major shipbuilding programs across the Coast Guard, and how much things have improved or not over the years?nn<strong>Shelby Oakley <\/strong>Yeah, unfortunately, I think with OPC (Offshore Patrol Cutter) and PSC (Polar Security Cutter), they are kind of indicative of the things that we've seen as struggles for Coast Guard shipbuilding, but also Navy shipbuilding over the years. Just major challenges with achieving stable designs to support actually beginning construction, and what that often results in is rework and delays and that kind of thing. And I think, OPC and PSC are delayed four and five years respectively, are now 11 billion and at least $2 billion over budget. So these outcomes are just a bit of a challenge, especially for an organization like Coast Guard with such a small budget for acquisitions.nn<strong>Jared Serbu <\/strong>Yeah. And you talk about concurrency in the testimony, is that really the main issue here, moving ahead into later phases of the program before you really have a clear picture of what you're doing?nn<strong>Shelby Oakley <\/strong>It's a huge issue. We've done a lot of work over the years on commercial shipbuilding. And the outcomes that commercial shipbuilders achieve are nothing like we see in the Coast Guard and the Navy. They are on time and on budget. And it's not kind of a question. And the common things that we see them do, or what we call leading practices for shipbuilding and ship design, and one of the main parameters is they just don't move forward until they're, key elements of their design are matured. This is like structural layouts, where the equipment's going to go. All sorts of things like that need to be figured out before you move forward and start cutting steel or bending metal, as they say, because any changes at that point really result in reverberating bad effects. And we saw that on PSC. They had designed the height of the deck, for one of the lower decks of the ship incorrectly. And that had reverberating design change impacts throughout the ship. Had they have begun constructing that ship, at this point, we would have been in big trouble. But at least they're just focused on redesigning those aspects at this point.nn<strong>Jared Serbu <\/strong>You mentioned the agency size issue earlier, and that's kind of where my head goes sometimes when I think about the Coast Guard challenges relatively small agency doing incredibly complex engineering and acquisition work. But then I remind myself, well, the Navy has an entire command that's, I think, bigger than the whole Coast Guard that does this stuff. And they face many of the same issues. So is there just something inherent to naval shipbuilding or is this really all process improvement stuff?nn<strong>Shelby Oakley <\/strong>Yeah. I think one of the key differences that we see, between like government shipbuilding and commercial shipbuilding is this issue of lack of discipline. And this is sometimes driven by, the industrial base. So with commercial shipbuilding they have a ship lined up right after one another. So they have to keep those ships moving through the shipyards, otherwise there's severe financial ramifications for those companies. That's just not what we see in government shipbuilding. And government shipbuilding, they're allowed to proceed with design, with construction too early. Any challenges that we run into, we end up just throwing more money at these programs. There's been a lack of incentive in the industrial base because of kind of fits and starts of demand signal from the Navy and the Coast Guard. And so there's a lack of incentive to do and key investments, in technology or processes that could improve their performance in design and construction. And so there is something about government shipbuilding that's a little bit different. But if you look at the practices that we outline, there really just kind of common sense, they're not shocking to anybody. They're like logical and disciplined approaches that anybody would apply to their own life if you were buying a house or designing a pool.nn<strong>Jared Serbu <\/strong>One of the things in in your testimony that was striking to me, as you talk about these very long periods between milestone events, which are, I guess, the triggers that are designed to get senior leaders to really review a program in depth and make course corrections if they need to. They're like 4 or 5 years apart on these programs, like how big a role does that play in letting these things kind of spin out of control?nn<strong>Shelby Oakley <\/strong>Well, it's the early warning signal. If you don't have a milestone for several years, you're not tracking anything. You're not tracking delays to that. So it doesn't trigger this oversight review from Coast Guard officials or even DHS officials to be able to say, hey, wait, we're heading in the wrong direction or things aren't going so great, maybe we need to figure it out. And so we've made a number of recommendations over the years for the Coast Guard to add milestones to their acquisition baselines, so that there can be closer tracking of that progress to give a sense of how well the program is doing.nn<strong>Jared Serbu <\/strong>These two programs that we were talking about, specifically the OPC and the PSC. They're pretty far down the line at this point. On those programs specifically, to what extent is the diet kind of cast by past decisions that have been made? And how much can they specifically do to improve on these two?nn<strong>Shelby Oakley <\/strong>Yeah. So I think there's two separate answers there. So OPC as you know, has two stages. OPC stage one with just the first four ships are already underway and construction. OPC stage two is planning to start construction in September. And so we would suggest that the Coast Guard has an opportunity to make sure that the design of OPC stage two is matured sufficiently to be able to justify moving forward with that construction decision. And so if they do that, that could put them on a better path for OPC stage two. After those first 15 ships, the Coast Guard's intending to buy 25 ships total. We think for that next ten, there's an opportunity to really rethink how we're going about building these ships and driving more of these commercial practices into their approaches for that. So we think that there will be an opportunity in the long run for this program to make some changes. With regard to PSC, they plan to start construction by the end of the year. And we made a recommendation that they ensure that their design is mature and they understand how everything's working before they move forward with that. They concurred. But we have yet to have, confidence that they will actually ensure that the design is mature before they move forward. If they don't, it's going to lead to a lot of risky decisions and a lot of risky, risky outcomes that hopefully the Coast Guard at that point would more closely manage and ensure that we're executing that program to the best extent possible, given the risk that we've accepted by moving forward.nn<strong>Jared Serbu <\/strong>As you mentioned, these leading practices have been down on paper since 2009. Still not much evidence of them showing up in programs. Is this something Congress should consider getting involved in?nn<strong>Shelby Oakley <\/strong>Yeah. So, we did our first tranche of work in 2009. And Congress has taken some action, specifically with regard to Navy programs, in requiring certain aspects of those leading practices. We have some matters for congressional consideration out there for Coast Guard programs that we're hoping that the Congress takes a good look at, especially in light of our most recent report that we updated those practices, this spring. There are a lot of similarities, but some new nuances given ten years, ten plus years of advancements in technology that these commercial shipbuilders all around the world are really employing to a great extent and to great success.nn<strong>Jared Serbu <\/strong>I did want to ask you one more question about the comparison between commercial and military. It seems like it wouldn't be that easy for government work to just get plugged into one of these commercial shipyards that doesn't already do much government work. That's one of the issues here, you sort of do need people with government experience?nn<strong>Shelby Oakley <\/strong>Yeah. I think we've seen on the, OPC and PSC that the shipbuilders have a lack of experience in government contracting. And that has led to some of the problems. They don't have the systems or capacities available that a lot of these major shipbuilders have that are consistently in this kind of government space. And so with the commercial practices, we're not necessarily saying go to commercial yards and have those ships built there. What we're saying is these builders that work for the government, that's their primary business, need to begin thinking about those practices that commercial builders use and how they could apply them in the government space to achieve better outcomes. And the DoD and the Coast Guard play a role in incentivizing them to do that, and requiring them to do that.<\/blockquote>"}};

The Navy isn’t the only military service that struggles with big shipbuilding programs. Two of the Coast Guard’s biggest programs — the Offshore Patrol Cutter and the Polar Security Cutter — are years behind schedule and billions of dollars over budget. The Government Accountability Office (GAO) says those cost and schedule increases are signs of broader management and oversight problems. For more on the Federal Drive with Tom Temin, Federal News Networks Host of On DoD, Jared Serbu talked with Shelby Oakley, GAO’s Director for Contracting and National Security Issues.

Interview Transcript: 

Jared Serbu I think it’s fair to say the Coast Guard has really had major struggles over the years with these major acquisition programs. I know your recent testimony was focused really on just a couple of those, the offshore patrol cutter and the polar security cutter. So what did those programs sort of tell us about the state of play in major shipbuilding programs across the Coast Guard, and how much things have improved or not over the years?

Shelby Oakley Yeah, unfortunately, I think with OPC (Offshore Patrol Cutter) and PSC (Polar Security Cutter), they are kind of indicative of the things that we’ve seen as struggles for Coast Guard shipbuilding, but also Navy shipbuilding over the years. Just major challenges with achieving stable designs to support actually beginning construction, and what that often results in is rework and delays and that kind of thing. And I think, OPC and PSC are delayed four and five years respectively, are now 11 billion and at least $2 billion over budget. So these outcomes are just a bit of a challenge, especially for an organization like Coast Guard with such a small budget for acquisitions.

Jared Serbu Yeah. And you talk about concurrency in the testimony, is that really the main issue here, moving ahead into later phases of the program before you really have a clear picture of what you’re doing?

Shelby Oakley It’s a huge issue. We’ve done a lot of work over the years on commercial shipbuilding. And the outcomes that commercial shipbuilders achieve are nothing like we see in the Coast Guard and the Navy. They are on time and on budget. And it’s not kind of a question. And the common things that we see them do, or what we call leading practices for shipbuilding and ship design, and one of the main parameters is they just don’t move forward until they’re, key elements of their design are matured. This is like structural layouts, where the equipment’s going to go. All sorts of things like that need to be figured out before you move forward and start cutting steel or bending metal, as they say, because any changes at that point really result in reverberating bad effects. And we saw that on PSC. They had designed the height of the deck, for one of the lower decks of the ship incorrectly. And that had reverberating design change impacts throughout the ship. Had they have begun constructing that ship, at this point, we would have been in big trouble. But at least they’re just focused on redesigning those aspects at this point.

Jared Serbu You mentioned the agency size issue earlier, and that’s kind of where my head goes sometimes when I think about the Coast Guard challenges relatively small agency doing incredibly complex engineering and acquisition work. But then I remind myself, well, the Navy has an entire command that’s, I think, bigger than the whole Coast Guard that does this stuff. And they face many of the same issues. So is there just something inherent to naval shipbuilding or is this really all process improvement stuff?

Shelby Oakley Yeah. I think one of the key differences that we see, between like government shipbuilding and commercial shipbuilding is this issue of lack of discipline. And this is sometimes driven by, the industrial base. So with commercial shipbuilding they have a ship lined up right after one another. So they have to keep those ships moving through the shipyards, otherwise there’s severe financial ramifications for those companies. That’s just not what we see in government shipbuilding. And government shipbuilding, they’re allowed to proceed with design, with construction too early. Any challenges that we run into, we end up just throwing more money at these programs. There’s been a lack of incentive in the industrial base because of kind of fits and starts of demand signal from the Navy and the Coast Guard. And so there’s a lack of incentive to do and key investments, in technology or processes that could improve their performance in design and construction. And so there is something about government shipbuilding that’s a little bit different. But if you look at the practices that we outline, there really just kind of common sense, they’re not shocking to anybody. They’re like logical and disciplined approaches that anybody would apply to their own life if you were buying a house or designing a pool.

Jared Serbu One of the things in in your testimony that was striking to me, as you talk about these very long periods between milestone events, which are, I guess, the triggers that are designed to get senior leaders to really review a program in depth and make course corrections if they need to. They’re like 4 or 5 years apart on these programs, like how big a role does that play in letting these things kind of spin out of control?

Shelby Oakley Well, it’s the early warning signal. If you don’t have a milestone for several years, you’re not tracking anything. You’re not tracking delays to that. So it doesn’t trigger this oversight review from Coast Guard officials or even DHS officials to be able to say, hey, wait, we’re heading in the wrong direction or things aren’t going so great, maybe we need to figure it out. And so we’ve made a number of recommendations over the years for the Coast Guard to add milestones to their acquisition baselines, so that there can be closer tracking of that progress to give a sense of how well the program is doing.

Jared Serbu These two programs that we were talking about, specifically the OPC and the PSC. They’re pretty far down the line at this point. On those programs specifically, to what extent is the diet kind of cast by past decisions that have been made? And how much can they specifically do to improve on these two?

Shelby Oakley Yeah. So I think there’s two separate answers there. So OPC as you know, has two stages. OPC stage one with just the first four ships are already underway and construction. OPC stage two is planning to start construction in September. And so we would suggest that the Coast Guard has an opportunity to make sure that the design of OPC stage two is matured sufficiently to be able to justify moving forward with that construction decision. And so if they do that, that could put them on a better path for OPC stage two. After those first 15 ships, the Coast Guard’s intending to buy 25 ships total. We think for that next ten, there’s an opportunity to really rethink how we’re going about building these ships and driving more of these commercial practices into their approaches for that. So we think that there will be an opportunity in the long run for this program to make some changes. With regard to PSC, they plan to start construction by the end of the year. And we made a recommendation that they ensure that their design is mature and they understand how everything’s working before they move forward with that. They concurred. But we have yet to have, confidence that they will actually ensure that the design is mature before they move forward. If they don’t, it’s going to lead to a lot of risky decisions and a lot of risky, risky outcomes that hopefully the Coast Guard at that point would more closely manage and ensure that we’re executing that program to the best extent possible, given the risk that we’ve accepted by moving forward.

Jared Serbu As you mentioned, these leading practices have been down on paper since 2009. Still not much evidence of them showing up in programs. Is this something Congress should consider getting involved in?

Shelby Oakley Yeah. So, we did our first tranche of work in 2009. And Congress has taken some action, specifically with regard to Navy programs, in requiring certain aspects of those leading practices. We have some matters for congressional consideration out there for Coast Guard programs that we’re hoping that the Congress takes a good look at, especially in light of our most recent report that we updated those practices, this spring. There are a lot of similarities, but some new nuances given ten years, ten plus years of advancements in technology that these commercial shipbuilders all around the world are really employing to a great extent and to great success.

Jared Serbu I did want to ask you one more question about the comparison between commercial and military. It seems like it wouldn’t be that easy for government work to just get plugged into one of these commercial shipyards that doesn’t already do much government work. That’s one of the issues here, you sort of do need people with government experience?

Shelby Oakley Yeah. I think we’ve seen on the, OPC and PSC that the shipbuilders have a lack of experience in government contracting. And that has led to some of the problems. They don’t have the systems or capacities available that a lot of these major shipbuilders have that are consistently in this kind of government space. And so with the commercial practices, we’re not necessarily saying go to commercial yards and have those ships built there. What we’re saying is these builders that work for the government, that’s their primary business, need to begin thinking about those practices that commercial builders use and how they could apply them in the government space to achieve better outcomes. And the DoD and the Coast Guard play a role in incentivizing them to do that, and requiring them to do that.

The post Coast Guard still struggling with major acquisition programs first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/defense-main/2024/05/coast-guard-still-struggling-with-major-acquisition-programs/feed/ 0
Army changing the color of money used to modernize software https://federalnewsnetwork.com/army/2024/05/army-changing-the-color-of-money-used-to-modernize-software/ https://federalnewsnetwork.com/army/2024/05/army-changing-the-color-of-money-used-to-modernize-software/#respond Tue, 14 May 2024 15:58:58 +0000 https://federalnewsnetwork.com/?p=5000433 The Army will keep most software development efforts in ongoing development mode and not transition them to sustainment as part of its modernization efforts.

The post Army changing the color of money used to modernize software first appeared on Federal News Network.

]]>
var config_5001968 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB6539456244.mp3?updated=1715759689"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Army changing the color of money used to modernize software","description":"[hbidcpodcast podcastid='5001968']nnWhen it comes to software development, the Army is going to stop worrying about the color of money.nnThat\u2019s because as part of its new approach to software modernization, the Army is rethinking what sustainment means.nnMargaret Boatner is the deputy assistant secretary of the Army for strategy and acquisition reform, said one of the main tenets of the policy signed by Army Secretary Christine Wormuth in March is to reform several legacy processes that is keeping the service from <a href="https:\/\/federalnewsnetwork.com\/cloud-computing\/2024\/03\/dod-cloud-exchange-2024-armys-leo-garciga-on-clearing-obstacles-to-digital-transformation\/">adopting modern software development<\/a> approaches.nn[caption id="attachment_4434599" align="alignright" width="300"]<img class="size-medium wp-image-4434599" src="https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/01\/margaret-boatner-e1673995409964-300x225.jpg" alt="" width="300" height="225" \/> Margaret Boatner, deputy assistant secretary of the Army for strategy and acquisition reform[\/caption]nn\u201cWe are targeting a couple of really key processes like our test and evaluation processes, and importantly, our cybersecurity processes. We really are trying to modernize and streamline those as well as changing the way we think about sustainment because software is really never done. We really have to retrain ourselves to think about and to acknowledge the fact that software really needs to stay in development all the time,\u201d Boatner said in an exclusive interview with Federal News Network. \u201cRight now, our systems and our acquisition programs, once they're done being developed, they go through a process that we call transition to sustainment, meaning they've been fully developed and are now going to live in our inventory for 10, 20, 30 years. We're going to sustain them for a long period of time. When a system makes that transition, the financial management regulations dictate that they use a certain color of money, operations and maintenance dollars. With that color of money, we can really only do minor patches, fixes and bug updates. So that's an example of a legacy process that, when you're talking about a software system, really tied our arms behind our back. It really prevented us from doing true development over the long term with the software solutions.\u201dnnBoatner said under the new policy, software will no longer make the transition to sustainment. Instead, the program office will keep operating under research, development, test and evaluation (RDT&E) funding.nn\u201cIt\u2019s recognizing that a continuous integration\/continuous delivery (CI\/CD) model software is never done. That way, our program managers can plan to use the appropriate color of money, which in many cases might be RDT&E, which is the color money you need to do true development,\u201d she said. \u201cSo, that will give our program managers a lot more flexibility to determine the appropriate color money based on what they want to do, such that our software systems can really continue to be developed over time.\u201dnnThe Army has been on this path to software modernization path for several years, with it culminating with the <a href="https:\/\/www.army.mil\/article\/274356\/army_announces_new_policy_to_drive_adoption_of_agile_software_development_practices" target="_blank" rel="noopener">March memo<\/a>.nnWith the lessons from the <a href="https:\/\/federalnewsnetwork.com\/army\/2023\/10\/army-turning-lessons-learned-from-11-software-pathway-pilots-into-new-policies\/">11 software pathways<\/a> to testing out a new approach to a continuous authority to operate to the broad adoption of the <a href="Adaptive%20Acquisition%20Framework" target="_blank" rel="noopener">Adaptive Acquisition Framework<\/a>, Boatner and Leo Garciga, the Army\u2019s chief information officer, are clearing obstacles, modernizing policies and attempting to change the culture of how the Army buys, builds and manages software.n<h2>Army updating ATO policy<\/h2>nGarciga said by keeping programs under the RDT&E bucket, the Army is recognizing the other changes it needs to complete to make these efforts more successful.nn\u201cWe need to relook at processes like interoperability. Historically, that was not a parallel process, but definitely a series process. How do we change the way we look at that to bring it into this model where we're developing at speed and scale all the time?\u201d he said. \u201cI think we're starting to see the beginnings of the second- and third-order effects of some of these decisions. The software directive really encapsulated some big rocks that need to move. We're finding things in our processes that we're going to have to quickly change to get to the end state we're looking for.\u201dnnSince taking over the CIO role in July, Garciga has been on a mission to <a href="https:\/\/federalnewsnetwork.com\/ask-the-cio\/2023\/10\/army-cio-garciga-kicks-off-tenure-by-simplifying-cloud-software-development\/">modernize IT policies<\/a> that are standing in the way. The latest one is around a continuous ATO (C-ATO).nnHe said the new policy could be out later this summer.nn\u201cWe've told folks to do DevSecOps and to bring agile into how they deliver software, so how do we accredit that? How do we certify that? What does that model look like? We're hyper-focused on building out a framework that we can push out to the entire Army,\u201d Garciga said. \u201cWhether you're at a program of record, or you're sitting at an Army command, who has an enterprise capability, we will give some guidelines on how we do that, or at least an initial operational framework that says these are the basic steps you need to be certified to do DevSecOps, which really gets to the end state that we're shooting for.\u201dnnHe added the current approach to obtaining an ATO is too compliance focused and not risk based.n<h2>Pilot demonstrated what is possible<\/h2>nGarciga highlighted a recent example of the barriers to getting C-ATO.nn\u201cWe started looking at some initial programs with a smart team and we found some interesting things. There was some things that were holding us back like a program that was ready to do CI\/CD and actually could do releases every day, but because of interoperability testing and the nature of how we were implementing that in the Army, it was causing them to only release two times a year, which is insane,\u201d he said. \u201cWe very quickly got together and rewickered the entire approach for how we were going to do interoperability testing inside the Army. We're hoping that leads to the department also taking a look at that as we look at the joint force and joint interoperability and maybe they follow our lead, so we can break down some of those barriers.\u201dnnAdditionally, the Army undertook a pilot to test out this new C-ATO approach.nnGarciga said the test case proved a program could receive at least an initial C-ATO in less than 90 days by bringing in red and purple teams to review the code.nn\u201cI'd say about three months ago, we actually slimmed down the administrative portion and focused on what were the things that would allow us to protect our data, protect access to a system and make a system survivable. We really condensed down the entire risk management framework (RMF) process to six critical controls,\u201d he said. \u201cOn top of that, we added a red team and a purple team to actually do penetration testing in real time against that system as it was deployed in production. What that did is it took our entire time from no ATO to having at least an ATO with conditions down to about less than 90 days. That was really our first pilot to see if we can we actually do this, and what are our challenges in doing that.\u201dnnGarciga said one of the big challenges that emerged was the need to train employees to take a more threat-based approach to ATOs. Another challenge that emerged was the Army applied its on-premise ATO approach to the cloud, which Garciga said didn\u2019t make a lot of sense.nn\u201cWe put some new policy out to really focus on what it means to accredit cloud services and to make that process a lot easier. One of our pilots, as we looked at how do we speed up the process and get someone to a viable CI\/CD pipeline, we found things that were really in the way like interoperability testing and how do we get that out of the way and streamline that process,\u201d he said. \u201cIn our pilots, the one part that we did find very interesting was this transition of our security control assessors from folks that have historically looked at some very specific paperwork to actually now getting on a system and looking at code, looking at triggers that have happened inside some of our CI\/CD tools and making very difficult threshold decisions based on risk and risk that an authorizing official would take to make those decisions. We're still very much working on what our training plan would be around that piece. That'll be a big portion of how we're going to certify CI\/CD work and DevSecOps pipelines in the Army moving forward.\u201d"}};

When it comes to software development, the Army is going to stop worrying about the color of money.

That’s because as part of its new approach to software modernization, the Army is rethinking what sustainment means.

Margaret Boatner is the deputy assistant secretary of the Army for strategy and acquisition reform, said one of the main tenets of the policy signed by Army Secretary Christine Wormuth in March is to reform several legacy processes that is keeping the service from adopting modern software development approaches.

Margaret Boatner, deputy assistant secretary of the Army for strategy and acquisition reform

“We are targeting a couple of really key processes like our test and evaluation processes, and importantly, our cybersecurity processes. We really are trying to modernize and streamline those as well as changing the way we think about sustainment because software is really never done. We really have to retrain ourselves to think about and to acknowledge the fact that software really needs to stay in development all the time,” Boatner said in an exclusive interview with Federal News Network. “Right now, our systems and our acquisition programs, once they’re done being developed, they go through a process that we call transition to sustainment, meaning they’ve been fully developed and are now going to live in our inventory for 10, 20, 30 years. We’re going to sustain them for a long period of time. When a system makes that transition, the financial management regulations dictate that they use a certain color of money, operations and maintenance dollars. With that color of money, we can really only do minor patches, fixes and bug updates. So that’s an example of a legacy process that, when you’re talking about a software system, really tied our arms behind our back. It really prevented us from doing true development over the long term with the software solutions.”

Boatner said under the new policy, software will no longer make the transition to sustainment. Instead, the program office will keep operating under research, development, test and evaluation (RDT&E) funding.

“It’s recognizing that a continuous integration/continuous delivery (CI/CD) model software is never done. That way, our program managers can plan to use the appropriate color of money, which in many cases might be RDT&E, which is the color money you need to do true development,” she said. “So, that will give our program managers a lot more flexibility to determine the appropriate color money based on what they want to do, such that our software systems can really continue to be developed over time.”

The Army has been on this path to software modernization path for several years, with it culminating with the March memo.

With the lessons from the 11 software pathways to testing out a new approach to a continuous authority to operate to the broad adoption of the Adaptive Acquisition Framework, Boatner and Leo Garciga, the Army’s chief information officer, are clearing obstacles, modernizing policies and attempting to change the culture of how the Army buys, builds and manages software.

Army updating ATO policy

Garciga said by keeping programs under the RDT&E bucket, the Army is recognizing the other changes it needs to complete to make these efforts more successful.

“We need to relook at processes like interoperability. Historically, that was not a parallel process, but definitely a series process. How do we change the way we look at that to bring it into this model where we’re developing at speed and scale all the time?” he said. “I think we’re starting to see the beginnings of the second- and third-order effects of some of these decisions. The software directive really encapsulated some big rocks that need to move. We’re finding things in our processes that we’re going to have to quickly change to get to the end state we’re looking for.”

Since taking over the CIO role in July, Garciga has been on a mission to modernize IT policies that are standing in the way. The latest one is around a continuous ATO (C-ATO).

He said the new policy could be out later this summer.

“We’ve told folks to do DevSecOps and to bring agile into how they deliver software, so how do we accredit that? How do we certify that? What does that model look like? We’re hyper-focused on building out a framework that we can push out to the entire Army,” Garciga said. “Whether you’re at a program of record, or you’re sitting at an Army command, who has an enterprise capability, we will give some guidelines on how we do that, or at least an initial operational framework that says these are the basic steps you need to be certified to do DevSecOps, which really gets to the end state that we’re shooting for.”

He added the current approach to obtaining an ATO is too compliance focused and not risk based.

Pilot demonstrated what is possible

Garciga highlighted a recent example of the barriers to getting C-ATO.

“We started looking at some initial programs with a smart team and we found some interesting things. There was some things that were holding us back like a program that was ready to do CI/CD and actually could do releases every day, but because of interoperability testing and the nature of how we were implementing that in the Army, it was causing them to only release two times a year, which is insane,” he said. “We very quickly got together and rewickered the entire approach for how we were going to do interoperability testing inside the Army. We’re hoping that leads to the department also taking a look at that as we look at the joint force and joint interoperability and maybe they follow our lead, so we can break down some of those barriers.”

Additionally, the Army undertook a pilot to test out this new C-ATO approach.

Garciga said the test case proved a program could receive at least an initial C-ATO in less than 90 days by bringing in red and purple teams to review the code.

“I’d say about three months ago, we actually slimmed down the administrative portion and focused on what were the things that would allow us to protect our data, protect access to a system and make a system survivable. We really condensed down the entire risk management framework (RMF) process to six critical controls,” he said. “On top of that, we added a red team and a purple team to actually do penetration testing in real time against that system as it was deployed in production. What that did is it took our entire time from no ATO to having at least an ATO with conditions down to about less than 90 days. That was really our first pilot to see if we can we actually do this, and what are our challenges in doing that.”

Garciga said one of the big challenges that emerged was the need to train employees to take a more threat-based approach to ATOs. Another challenge that emerged was the Army applied its on-premise ATO approach to the cloud, which Garciga said didn’t make a lot of sense.

“We put some new policy out to really focus on what it means to accredit cloud services and to make that process a lot easier. One of our pilots, as we looked at how do we speed up the process and get someone to a viable CI/CD pipeline, we found things that were really in the way like interoperability testing and how do we get that out of the way and streamline that process,” he said. “In our pilots, the one part that we did find very interesting was this transition of our security control assessors from folks that have historically looked at some very specific paperwork to actually now getting on a system and looking at code, looking at triggers that have happened inside some of our CI/CD tools and making very difficult threshold decisions based on risk and risk that an authorizing official would take to make those decisions. We’re still very much working on what our training plan would be around that piece. That’ll be a big portion of how we’re going to certify CI/CD work and DevSecOps pipelines in the Army moving forward.”

The post Army changing the color of money used to modernize software first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/army/2024/05/army-changing-the-color-of-money-used-to-modernize-software/feed/ 0
DoD stands up ‘SWAT team’ to help speed software acquisition https://federalnewsnetwork.com/defense-news/2024/05/dod-stands-up-swat-team-to-help-speed-software-acquisition/ https://federalnewsnetwork.com/defense-news/2024/05/dod-stands-up-swat-team-to-help-speed-software-acquisition/#respond Fri, 10 May 2024 11:17:31 +0000 https://federalnewsnetwork.com/?p=4995934 Adoption of DoD's new software acquisition pathway has been slow, but officials are looking for ways to jumpstart its use.

The post DoD stands up ‘SWAT team’ to help speed software acquisition first appeared on Federal News Network.

]]>
var config_4996150 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB4100360098.mp3?updated=1715327427"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"DoD stands up ‘SWAT team’ to help speed software acquisition","description":"[hbidcpodcast podcastid='4996150']nnIt\u2019s been four years since the Defense Department created six new acquisition pathways \u2014 including one specifically intended to speed up software acquisition. But as often happens with policy reforms, implementation is off to a slow start, so officials are building a cadre of software experts at the Pentagon to help speed up adoption.nnDoD created the software acquisition pathway as <a href="https:\/\/federalnewsnetwork.com\/on-dod\/2021\/03\/dods-new-adaptive-acquisition-framework-takes-new-approach-to-tailoring-procurement-strategies\/" target="_blank" rel="noopener noreferrer nofollow">part of a broader overhaul<\/a> to make its acquisition system more \u201cadaptive\u201d to the particular products or services the department buys. The software pathway in particular came out of a recognition that most of DoD\u2019s traditional approaches were geared toward large weapons systems. It\u2019s designed to encourage rapid development and close coordination with users, and also eliminates some steps of the traditional acquisition process that don\u2019t make sense for software.nnCara Abercrombie, the assistant secretary of Defense for acquisition, said she has heard positive feedback from program managers throughout the military services, but they don\u2019t always feel empowered to use the new pathway.nn\u201cThey love it. They want to use it more expansively,\u201d she said Thursday at the Naval Postgraduate School\u2019s annual acquisition research symposium in Monterey, California. \u201cBut my sense is there\u2019s a little bit of risk aversion in the system, a little bit of worry, because it moves fast, it doesn't have to check all the same boxes as the other acquisition pathways. And I do think there can often be reluctance to use it.\u201dn<h2>Only about 50 programs using software acquisition pathway so far<\/h2>nAccording to the Government Accountability Office, there are only about 50 programs across DoD using the software pathway. In a <a href="https:\/\/www.gao.gov\/assets\/gao-23-105867.pdf" target="_blank" rel="noopener">report last summer<\/a>, GAO also found that software-intensive programs that aren\u2019t using the software pathway don\u2019t tend to use modern, agile development methodologies.nnBut Abercrombie said DoD is looking to drive wider adoption, and is <span class="ai-text">establishing<\/span> a specialized cadre of software experts within her office.nn\u201cIt will be a team of experts who know how to use the software pathway, who know how to do agile acquisition strategies,\u201d she said. \u201cWe\u2019re going to make sure they are more or less a SWAT team, if you will, that can parachute into program offices to provide deskside support, to help walk program office teams through how to get the software pathway going effectively. We also need to do some forensics as to understanding why there hasn\u2019t been wider adoption, but I suspect some of it is that it\u2019s so different from what we've done before.\u201dnnCongress mandated the standup of that new software cadre in the 2022 Defense authorization bill. Lawmakers also ordered DoD to create a dedicated software specialist career path to help develop that group of experts, and to develop military members with technical skills into software experts.n<h2>Military services also pursuing changes<\/h2>nMeanwhile, the military services are doing work of their own to get more out of the software pathway. In March, the <a href="https:\/\/federalnewsnetwork.com\/cloud-computing\/2024\/03\/dod-cloud-exchange-2024-armys-leo-garciga-on-clearing-obstacles-to-digital-transformation\/" target="_blank" rel="noopener">Army, for example<\/a>, issued policies that told the acquisition workforce to \u201cmaximize\u201d their use of the software pathway and move to industry best practices for software development.nnIn an <a href="https:\/\/federalnewsnetwork.com\/ask-the-cio\/2024\/04\/army-has-burned-the-software-development-bridges-behind-them\/" target="_blank" rel="noopener">April interview<\/a> with Federal News Network, Margaret Boatner, the deputy assistant secretary of the Army for strategy and acquisition <span class="ai-text">reform,<\/span> said the service has only used the pathway for 11 programs so far, but officials have seen clear benefits.nn\u201cThere's a lot less documentation and review requirements to start a program on the software pathway. But even more importantly, it actually requires us to use modern software practices. It's not an option; we have to use agile, lean DevSecOps, continuous integration and continuous delivery, those types of things,\u201d she said. \u201cTraditionally when you look at our software systems, we released capability drops every three to four years. We have programs now that are operating on the software pathway that are delivering every 12 months, every nine months, and striving to deliver capability every six months. Sure, that\u2019s not quite as quickly as industry, but it's absolutely progress.\u201dn<h2>A separate challenge: funding software<\/h2>nBut even if the pathway helps solve some of DoD\u2019s acquisition process problems, it doesn\u2019t do much to fix the way Congress and the department fund software development.nnAs of now, program managers have to run through complex legal hurdles to determine whether specific aspects of their programs need to be funded from procurement, R&D or operations and maintenance accounts. Congress has authorized a pilot program that lets officials fund software with just a single color of money \u2014 and <a href="https:\/\/federalnewsnetwork.com\/navy\/2023\/11\/navy-says-two-programs-show-the-case-for-colorless-it-spending\/" target="_blank" rel="noopener">program managers love that approach too<\/a> \u2014 but lawmakers have only authorized six programs for the pilot so far.nnIn its <a href="https:\/\/federalnewsnetwork.com\/defense-main\/2024\/03\/long-awaited-report-would-replace-dods-ppbe-system-with-defense-resourcing-system\/" target="_blank" rel="noopener">final report in March<\/a>, the congressional commission on Planning, Programming, Budgeting and Execution Reform said Congress needs to expand the single color of money idea to all DoD software programs.nn\u201cI\u2019ve had to be on reprogramming actions where you're changing money between appropriations just because of the way [an aspect of a software program] has been defined,\u201d Elizabeth Bieri, the commission\u2019s director of research and a former DoD financial management <span class="ai-text">official,<\/span> told the NPS symposium Thursday. \u201cWell, it\u2019s really not that different. I think back to the years when you had to use procurement to buy all your IT equipment, and now it\u2019s just regular O&M money. This would be just kind of the continuation of how people work things today, and the continuation of the evolution of software. If I'm changing code because of a bug fix, how is that any different than incorporating something for new interoperability features? I think if you combine all of these things, you\u2019ll have the ability to make the changes that are required when needed without an arbitrary seam.\u201dnn "}};

It’s been four years since the Defense Department created six new acquisition pathways — including one specifically intended to speed up software acquisition. But as often happens with policy reforms, implementation is off to a slow start, so officials are building a cadre of software experts at the Pentagon to help speed up adoption.

DoD created the software acquisition pathway as part of a broader overhaul to make its acquisition system more “adaptive” to the particular products or services the department buys. The software pathway in particular came out of a recognition that most of DoD’s traditional approaches were geared toward large weapons systems. It’s designed to encourage rapid development and close coordination with users, and also eliminates some steps of the traditional acquisition process that don’t make sense for software.

Cara Abercrombie, the assistant secretary of Defense for acquisition, said she has heard positive feedback from program managers throughout the military services, but they don’t always feel empowered to use the new pathway.

“They love it. They want to use it more expansively,” she said Thursday at the Naval Postgraduate School’s annual acquisition research symposium in Monterey, California. “But my sense is there’s a little bit of risk aversion in the system, a little bit of worry, because it moves fast, it doesn’t have to check all the same boxes as the other acquisition pathways. And I do think there can often be reluctance to use it.”

Only about 50 programs using software acquisition pathway so far

According to the Government Accountability Office, there are only about 50 programs across DoD using the software pathway. In a report last summer, GAO also found that software-intensive programs that aren’t using the software pathway don’t tend to use modern, agile development methodologies.

But Abercrombie said DoD is looking to drive wider adoption, and is establishing a specialized cadre of software experts within her office.

“It will be a team of experts who know how to use the software pathway, who know how to do agile acquisition strategies,” she said. “We’re going to make sure they are more or less a SWAT team, if you will, that can parachute into program offices to provide deskside support, to help walk program office teams through how to get the software pathway going effectively. We also need to do some forensics as to understanding why there hasn’t been wider adoption, but I suspect some of it is that it’s so different from what we’ve done before.”

Congress mandated the standup of that new software cadre in the 2022 Defense authorization bill. Lawmakers also ordered DoD to create a dedicated software specialist career path to help develop that group of experts, and to develop military members with technical skills into software experts.

Military services also pursuing changes

Meanwhile, the military services are doing work of their own to get more out of the software pathway. In March, the Army, for example, issued policies that told the acquisition workforce to “maximize” their use of the software pathway and move to industry best practices for software development.

In an April interview with Federal News Network, Margaret Boatner, the deputy assistant secretary of the Army for strategy and acquisition reform, said the service has only used the pathway for 11 programs so far, but officials have seen clear benefits.

“There’s a lot less documentation and review requirements to start a program on the software pathway. But even more importantly, it actually requires us to use modern software practices. It’s not an option; we have to use agile, lean DevSecOps, continuous integration and continuous delivery, those types of things,” she said. “Traditionally when you look at our software systems, we released capability drops every three to four years. We have programs now that are operating on the software pathway that are delivering every 12 months, every nine months, and striving to deliver capability every six months. Sure, that’s not quite as quickly as industry, but it’s absolutely progress.”

A separate challenge: funding software

But even if the pathway helps solve some of DoD’s acquisition process problems, it doesn’t do much to fix the way Congress and the department fund software development.

As of now, program managers have to run through complex legal hurdles to determine whether specific aspects of their programs need to be funded from procurement, R&D or operations and maintenance accounts. Congress has authorized a pilot program that lets officials fund software with just a single color of money — and program managers love that approach too — but lawmakers have only authorized six programs for the pilot so far.

In its final report in March, the congressional commission on Planning, Programming, Budgeting and Execution Reform said Congress needs to expand the single color of money idea to all DoD software programs.

“I’ve had to be on reprogramming actions where you’re changing money between appropriations just because of the way [an aspect of a software program] has been defined,” Elizabeth Bieri, the commission’s director of research and a former DoD financial management official, told the NPS symposium Thursday. “Well, it’s really not that different. I think back to the years when you had to use procurement to buy all your IT equipment, and now it’s just regular O&M money. This would be just kind of the continuation of how people work things today, and the continuation of the evolution of software. If I’m changing code because of a bug fix, how is that any different than incorporating something for new interoperability features? I think if you combine all of these things, you’ll have the ability to make the changes that are required when needed without an arbitrary seam.”

 

The post DoD stands up ‘SWAT team’ to help speed software acquisition first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/defense-news/2024/05/dod-stands-up-swat-team-to-help-speed-software-acquisition/feed/ 0
What new White House guidance on grants means for agencies that hand them out https://federalnewsnetwork.com/acquisition/2024/05/what-new-white-house-guidance-on-grants-means-for-agencies-that-hand-them-out/ https://federalnewsnetwork.com/acquisition/2024/05/what-new-white-house-guidance-on-grants-means-for-agencies-that-hand-them-out/#respond Wed, 01 May 2024 18:58:19 +0000 https://federalnewsnetwork.com/?p=4984311 Now that it have been 10 years since issuing them, the White House has updated what is known as Uniform Guidance on grants and federal assistance. One reason for the update: reducing regulatory burden on…

The post What new White House guidance on grants means for agencies that hand them out first appeared on Federal News Network.

]]>
var config_4983676 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB8602550825.mp3?updated=1714549045"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"What new White House guidance on grants means for agencies that hand them out","description":"[hbidcpodcast podcastid='4983676']nnNow that it have been 10 years since issuing them, the White House has updated what is known as <a href="https:\/\/www.whitehouse.gov\/omb\/briefing-room\/2024\/04\/04\/the-biden-harris-administration-finalizes-guidance-to-make-grants-more-accessible-and-transparent-for-families-communities-and-small-businesses\/#:~:text=The%20finalized%20Uniform%20Grants%20Guidance,spending%20money%20on%20specific%20activities.">Uniform Guidance on grants and federal assistance<\/a>. One reason for the update: reducing regulatory burden on both agencies and grantees. For some highlights, <a href="https:\/\/federalnewsnetwork.com\/category\/temin\/tom-temin-federal-drive\/"><em><strong>the Federal Drive with Tom Temin<\/strong><\/em><\/a> spoke with Haynes Boone procurement attorney Dan Ramish.nn<em><strong>Interview Transcript:\u00a0<\/strong><\/em>n<blockquote><strong>Tom Temin<\/strong>\u00a0Dan, the uniform guidance is a little bit outside of FAR and contracting concerns. But yet, something you felt is important to highlight here.nn<strong>Dan Ramish <\/strong>Yes, Tom. So the federal government spends more than $1 trillion a year in grants and other federal financial assistance. So it's a really important tool, and it's important to taxpayers. And government contractors will sometimes participate in the federal grant space, either as contractors or as recipients or sub recipients. So there's a lot of money. And increasingly, the federal grant in assistance space is becoming subject to more requirements that start to look like government contracts. But this latest change in the uniform guidance is really intended to make things easier on awarding agencies and recipients and sub recipients.nn<strong>Tom Temin <\/strong>So what are some of the big changes people can expect? I mean, this has been like a rulemaking, even though it's not a rule per se, but there has been commentary and drafts and final versions. Fair to say?nn<strong>Dan Ramish <\/strong>Yes. So the uniform guidance forms the basis for agency grant and federal financial assistance regulations. So even though it's not a regulation itself, different agencies adopt it with a little bit of their own flavor. So the big things in this rulemaking, it was mostly changes in the margins. And there are some changes that are intended to improve access and the ability of recipients and some recipients to participate. So one of those changes is there's a new template for the standard solicitation and notice of funding opportunity. And that's in Appendix One of the Uniform Guidance. And there are some new guidelines contained in that appendix that tell federal awarding agencies to pull out their Strunk and White. They're supposed to reduce word count and use plain language, leave out provisions that aren't strictly necessary, and even include an executive summary 500 words that tells applicants the goals and objectives of the program, the target audience, and eligibility requirements.nn<strong>Tom Temin <\/strong>Sure, and there are also some updated thresholds for what gets audited, what gets investigated by the government, and also for some of the provisions for equipment and ancillary costs associated with a grant. What are some of the top ones there? Let's talk about maybe the threshold for what gets audited.nn<strong>Dan Ramish <\/strong>Yes. So the Single Audit Act requires audits for state and local governments and nonprofit organizations under federal grants and assistance. And that threshold hasn't been increased in many years. And now the updated guidance will raise that from $750,000 to $1 million in total expenditures of federal funds for a single fiscal year. So that's directly intended to make it easier for recipients that aren't receiving that higher volume of awards to not have to be subject to an audit.nn<strong>Tom Temin <\/strong>So for an agency that's giving awards, then if it gives a lot of them that are under a million, then its own burden is relieved if it doesn't have to audit every one of them.nn<strong>Dan Ramish <\/strong>That's right. The auditing agency may be different from the awarding agency, but it's certainly the burden on the auditors could also be reduced. And focusing on where the risk is,\u00a0 and certainly the order of magnitude is part of that risk analysis.nn<strong>Tom Temin <\/strong>Sure. Another big one is the de minimis rate adjustment. Tell us about that.nn<strong>Dan Ramish <\/strong>Sure. So the de minimis rate is a default indirect cost rate that the uniform guidance allows for recipients to use instead of negotiating at an indirect cost rate. And the benefit to recipients there is that there's no documentation requirement to justify the rate. And that rate also hasn't been adjusted for many years, and it's a pretty low indirect rate of 10%. And the updated guidance will increase that rate to 15%. And it also makes a related increase. So there's a limit on the amount of sub award funds that count as part of the modified total direct cost. So the de minimis rate is applied against a base that is the modified total direct cost of the award. And one of the adjustments is sub awards over a certain value are excluded. And the result there is, of course, the recipients aren't receiving as much of their indirect cost recovery as they otherwise would. And so that rate is also increasing from $25,000 to $50,000. So it will help recipients that use the de minimis rate to recover more of their actual indirect costs.nn<strong>Tom Temin <\/strong>We're speaking with Haynes Boone procurement attorney Dan Ramish. So that's the equivalent, well, the analog of when you look at a charity and what percent of the money actually goes to the charities and what percent is overhead. That's kind of what the de minimis is all about.nn<strong>Dan Ramish <\/strong>Yeah, it's covering administrative and general expenses that aren't directly tied to the award. But those are real costs that the recipients have to bear, and it's fair for them to get compensated for them. And particularly for newer recipients or sub recipients, it's more burdensome to have to go through the indirect rate negotiations with an agency. So this is a good option for many of them.nn<strong>Tom Temin <\/strong>A couple of the provisions I wanted to make sure we covered. There are new whistleblower protections and new requirements for reasonable cybersecurity internal controls that seems to be like maple syrup covering everything the government is eating these days. But let's talk about whistleblower protections in the context of grants.nn<strong>Dan Ramish <\/strong>Well, so whistleblower protections have been a focus across the government, including, of course, in government contracts. And this is directly related to concerns about controls over waste, fraud and abuse, and ensuring that there are mechanisms to prevent that and to promote enforcement. And so there's now a specific whistleblower protection that prevents recipients or sub recipients from reprisals against whistleblowers that report waste, fraud and abuse, and also requires them to notify employees of the whistleblower rights and protections.nn<strong>Tom Temin <\/strong>All right. And that's kind of making it a little bit more uniform with how whistleblowers are, in theory, protected elsewhere in other types of activities.nn<strong>Dan Ramish <\/strong>Yes, I would say that's one of the ways in which they're aligning things with government contracts.nn<strong>Tom Temin <\/strong>And then new requirements for reasonable cyber security, internal controls also kind of in alignment with what they're asking contractors for in various ways across the government.nn<strong>Dan Ramish <\/strong>That's right. Clearly cybersecurity has been a big priority for the administration. And I would say, though, that this requirement is pretty generic. They opted against imposing some of the more detailed rules that the Department of Defense has applied to government contracts. But it's a movement in that direction and reflects kind of the priority for the government in this area.nn<strong>Tom Temin <\/strong>And one more I wanted to ask you about, and that is the equipment threshold, because sometimes grants might be for laboratory work or for developing some kind of a new technology test and so forth. So there's a hardware, if you will piece to the grant and not just brainpower.nn<strong>Dan Ramish <\/strong>Yes. So there's a threshold for what constitutes equipment under the uniform guidance as well. And that is another threshold that is increasing to reduce the burden from 5,000 to $10,000. And the reason that's important is that there are special requirements for managing equipment. And so if an item that is purchased under an award doesn't constitute equipment that reduces the burden.nn<strong>Tom Temin <\/strong>All right. Anything else we need to know. And so agencies need to, I guess get this into their grant making apparatus and inculcate these guidance.nn<strong>Dan Ramish <\/strong>Yes. So there will be relief in a number of ways, as we said, with the thresholds, with efforts to make notices of funding opportunity, more plain language and easily understood by prospective recipients. So the effectiveness date is established as Oct. 1, 2024. Agencies also have the discretion to implement the new guidance earlier, but it has to be no earlier than June 21, 2024, and so agencies will be coming up with their own plans in the coming weeks to roll out their implementation of the final guidance. So recipients and sub recipients should be tracking that. May 15 is the date for the new guidance, so we'll see how this plays out.nn <\/blockquote>"}};

Now that it have been 10 years since issuing them, the White House has updated what is known as Uniform Guidance on grants and federal assistance. One reason for the update: reducing regulatory burden on both agencies and grantees. For some highlights, the Federal Drive with Tom Temin spoke with Haynes Boone procurement attorney Dan Ramish.

Interview Transcript: 

Tom Temin Dan, the uniform guidance is a little bit outside of FAR and contracting concerns. But yet, something you felt is important to highlight here.

Dan Ramish Yes, Tom. So the federal government spends more than $1 trillion a year in grants and other federal financial assistance. So it’s a really important tool, and it’s important to taxpayers. And government contractors will sometimes participate in the federal grant space, either as contractors or as recipients or sub recipients. So there’s a lot of money. And increasingly, the federal grant in assistance space is becoming subject to more requirements that start to look like government contracts. But this latest change in the uniform guidance is really intended to make things easier on awarding agencies and recipients and sub recipients.

Tom Temin So what are some of the big changes people can expect? I mean, this has been like a rulemaking, even though it’s not a rule per se, but there has been commentary and drafts and final versions. Fair to say?

Dan Ramish Yes. So the uniform guidance forms the basis for agency grant and federal financial assistance regulations. So even though it’s not a regulation itself, different agencies adopt it with a little bit of their own flavor. So the big things in this rulemaking, it was mostly changes in the margins. And there are some changes that are intended to improve access and the ability of recipients and some recipients to participate. So one of those changes is there’s a new template for the standard solicitation and notice of funding opportunity. And that’s in Appendix One of the Uniform Guidance. And there are some new guidelines contained in that appendix that tell federal awarding agencies to pull out their Strunk and White. They’re supposed to reduce word count and use plain language, leave out provisions that aren’t strictly necessary, and even include an executive summary 500 words that tells applicants the goals and objectives of the program, the target audience, and eligibility requirements.

Tom Temin Sure, and there are also some updated thresholds for what gets audited, what gets investigated by the government, and also for some of the provisions for equipment and ancillary costs associated with a grant. What are some of the top ones there? Let’s talk about maybe the threshold for what gets audited.

Dan Ramish Yes. So the Single Audit Act requires audits for state and local governments and nonprofit organizations under federal grants and assistance. And that threshold hasn’t been increased in many years. And now the updated guidance will raise that from $750,000 to $1 million in total expenditures of federal funds for a single fiscal year. So that’s directly intended to make it easier for recipients that aren’t receiving that higher volume of awards to not have to be subject to an audit.

Tom Temin So for an agency that’s giving awards, then if it gives a lot of them that are under a million, then its own burden is relieved if it doesn’t have to audit every one of them.

Dan Ramish That’s right. The auditing agency may be different from the awarding agency, but it’s certainly the burden on the auditors could also be reduced. And focusing on where the risk is,  and certainly the order of magnitude is part of that risk analysis.

Tom Temin Sure. Another big one is the de minimis rate adjustment. Tell us about that.

Dan Ramish Sure. So the de minimis rate is a default indirect cost rate that the uniform guidance allows for recipients to use instead of negotiating at an indirect cost rate. And the benefit to recipients there is that there’s no documentation requirement to justify the rate. And that rate also hasn’t been adjusted for many years, and it’s a pretty low indirect rate of 10%. And the updated guidance will increase that rate to 15%. And it also makes a related increase. So there’s a limit on the amount of sub award funds that count as part of the modified total direct cost. So the de minimis rate is applied against a base that is the modified total direct cost of the award. And one of the adjustments is sub awards over a certain value are excluded. And the result there is, of course, the recipients aren’t receiving as much of their indirect cost recovery as they otherwise would. And so that rate is also increasing from $25,000 to $50,000. So it will help recipients that use the de minimis rate to recover more of their actual indirect costs.

Tom Temin We’re speaking with Haynes Boone procurement attorney Dan Ramish. So that’s the equivalent, well, the analog of when you look at a charity and what percent of the money actually goes to the charities and what percent is overhead. That’s kind of what the de minimis is all about.

Dan Ramish Yeah, it’s covering administrative and general expenses that aren’t directly tied to the award. But those are real costs that the recipients have to bear, and it’s fair for them to get compensated for them. And particularly for newer recipients or sub recipients, it’s more burdensome to have to go through the indirect rate negotiations with an agency. So this is a good option for many of them.

Tom Temin A couple of the provisions I wanted to make sure we covered. There are new whistleblower protections and new requirements for reasonable cybersecurity internal controls that seems to be like maple syrup covering everything the government is eating these days. But let’s talk about whistleblower protections in the context of grants.

Dan Ramish Well, so whistleblower protections have been a focus across the government, including, of course, in government contracts. And this is directly related to concerns about controls over waste, fraud and abuse, and ensuring that there are mechanisms to prevent that and to promote enforcement. And so there’s now a specific whistleblower protection that prevents recipients or sub recipients from reprisals against whistleblowers that report waste, fraud and abuse, and also requires them to notify employees of the whistleblower rights and protections.

Tom Temin All right. And that’s kind of making it a little bit more uniform with how whistleblowers are, in theory, protected elsewhere in other types of activities.

Dan Ramish Yes, I would say that’s one of the ways in which they’re aligning things with government contracts.

Tom Temin And then new requirements for reasonable cyber security, internal controls also kind of in alignment with what they’re asking contractors for in various ways across the government.

Dan Ramish That’s right. Clearly cybersecurity has been a big priority for the administration. And I would say, though, that this requirement is pretty generic. They opted against imposing some of the more detailed rules that the Department of Defense has applied to government contracts. But it’s a movement in that direction and reflects kind of the priority for the government in this area.

Tom Temin And one more I wanted to ask you about, and that is the equipment threshold, because sometimes grants might be for laboratory work or for developing some kind of a new technology test and so forth. So there’s a hardware, if you will piece to the grant and not just brainpower.

Dan Ramish Yes. So there’s a threshold for what constitutes equipment under the uniform guidance as well. And that is another threshold that is increasing to reduce the burden from 5,000 to $10,000. And the reason that’s important is that there are special requirements for managing equipment. And so if an item that is purchased under an award doesn’t constitute equipment that reduces the burden.

Tom Temin All right. Anything else we need to know. And so agencies need to, I guess get this into their grant making apparatus and inculcate these guidance.

Dan Ramish Yes. So there will be relief in a number of ways, as we said, with the thresholds, with efforts to make notices of funding opportunity, more plain language and easily understood by prospective recipients. So the effectiveness date is established as Oct. 1, 2024. Agencies also have the discretion to implement the new guidance earlier, but it has to be no earlier than June 21, 2024, and so agencies will be coming up with their own plans in the coming weeks to roll out their implementation of the final guidance. So recipients and sub recipients should be tracking that. May 15 is the date for the new guidance, so we’ll see how this plays out.

 

The post What new White House guidance on grants means for agencies that hand them out first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/acquisition/2024/05/what-new-white-house-guidance-on-grants-means-for-agencies-that-hand-them-out/feed/ 0
Agencies set records for small business contracting in 2023 https://federalnewsnetwork.com/contractsawards/2024/04/agencies-set-records-for-small-business-contracting-in-2023/ https://federalnewsnetwork.com/contractsawards/2024/04/agencies-set-records-for-small-business-contracting-in-2023/#respond Mon, 29 Apr 2024 18:52:08 +0000 https://federalnewsnetwork.com/?p=4981084 The Small Business Administration says agencies awarded an all-time high of 28.4% of all eligible prime contracts to small businesses last fiscal year.

The post Agencies set records for small business contracting in 2023 first appeared on Federal News Network.

]]>
var config_4983680 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB3976350574.mp3?updated=1714547938"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Agencies set records for small business contracting in 2023","description":"[hbidcpodcast podcastid='4983680']nnAgencies, once again, set new records almost across the board for contracting with small businesses in fiscal 2023. New data from the Small Business Administration shows agencies awarded an all-time high of 28.4% of all eligible federal contract dollars to small businesses.nnAt the same time, SBA\u2019s new <a href="https:\/\/www.sba.gov\/agency-scorecards\/scorecard.html?agency=GW&year=2023" target="_blank" rel="noopener">small business scorecard data<\/a> shows agencies met or surpassed governmentwide goals in three of five socio-economic category, including service disabled veteran-owned small businesses.nnIn all, agencies awarded $178.6 billion to small businesses last year, which is an increase of $15.7 billion <a href="https:\/\/federalnewsnetwork.com\/contracting\/2023\/07\/agencies-making-substantial-progress-toward-higher-small-disadvantaged-contracting-goal\/">from 2022<\/a>.\u00a0 The governmentwide small business contracting goal is 23%.\u00a0 House Small Business Committee lawmakers recently <a href="https:\/\/smallbusiness.house.gov\/news\/documentsingle.aspx?DocumentID=405949" target="_blank" rel="noopener">passed a bill<\/a> to increase that goal to 25%.nn<strong><u>FY23 P<\/u><\/strong><strong><u>rime Contracting by Dollars and Percentages for All Categories*:<\/u><\/strong>nn n<table style="height: 391px;" width="693">n<tbody>n<tr>n<td rowspan="2" width="92"><strong>Category<\/strong><\/td>n<td rowspan="2" width="39"><strong>Goal<\/strong><\/td>n<td colspan="2" width="100"><strong>2021<\/strong><\/td>n<td colspan="2" width="100"><strong>2022<\/strong><\/td>n<td colspan="2" width="103"><strong>2023<\/strong><\/td>n<\/tr>n<tr>n<td width="50"><strong>$(B)<\/strong><\/td>n<td width="51"><strong>%<\/strong><\/td>n<td width="50"><strong>$(B)<\/strong><\/td>n<td width="51"><strong>%<\/strong><\/td>n<td width="53"><strong>$(B)<\/strong><\/td>n<td width="51"><strong>%<\/strong><\/td>n<\/tr>n<tr>n<td width="92"><strong>Small Business<\/strong><\/td>n<td width="51">26.02%<\/td>n<td width="50">$154.2<\/td>n<td width="51">27.23%<\/td>n<td width="50">$162.9<\/td>n<td width="51">26.50%<\/td>n<td width="53">$178.6<\/td>n<td width="51">28.35%<\/td>n<\/tr>n<tr>n<td width="92"><strong>Small Disadvantaged Business<\/strong><\/td>n<td width="51">10.54%<\/td>n<td width="50">$62.4<\/td>n<td width="51">11.01%<\/td>n<td width="50">$69.9<\/td>n<td width="51">11.38%<\/td>n<td width="53">$76.2<\/td>n<td width="51">12.10%<\/td>n<\/tr>n<tr>n<td width="92"><strong>Service-Disabled Veteran Owned Small Business<\/strong><\/td>n<td width="51">4.28%<\/td>n<td width="50">$25.0<\/td>n<td width="51">4.41%<\/td>n<td width="50">$28.1<\/td>n<td width="51">4.57%<\/td>n<td width="53">$31.9<\/td>n<td width="51">5.07%<\/td>n<\/tr>n<tr>n<td width="92"><strong>Women-Owned Small Business<\/strong><\/td>n<td width="51">4.85%<\/td>n<td width="50">$26.2<\/td>n<td width="51">4.63%<\/td>n<td width="50">$28.1<\/td>n<td width="51">4.57%<\/td>n<td width="53">$30.9<\/td>n<td width="51">4.91%<\/td>n<\/tr>n<tr>n<td width="92"><strong>HUBZone<\/strong><\/td>n<td width="51">2.44%<\/td>n<td width="50">$14.3<\/td>n<td width="51">2.53%<\/td>n<td width="50">$16.3<\/td>n<td width="51">2.65%<\/td>n<td width="53">$17.5<\/td>n<td width="51">2.78%<\/td>n<\/tr>n<\/tbody>n<\/table>n<ul>n \t<li><em>In accordance with federal law, SBA provided double credit for prime contract awards in disaster areas that were awarded as a local area set aside. SBA also included in the calculation of government-wide achievements Department of Energy first-tier subcontracts required to be included by section 318 of the Consolidated Appropriations Act of 2014 (\u201cCAA\u201d), Public Law 113-76.<\/em><\/li>n<\/ul>nOverall, SBA says 10 agencies received \u201cA+\u201d grades and two others received \u201cA\u201d grades on the scorecard, including the SBA, the departments of Agriculture Housing and Urban Development, Interior, Homeland Security and Commerce as well as the National Science Foundation, the General Services Administration, the Nuclear Regulatory Commission and the Office of Personnel Management.nnThe White House and SBA recognized the small business contracting accomplishments during a roundtable today as well as during National Small Business Week, which kicked off yesterday.nnAs part of the 2023 scorecard, SBA also released contract data broken down by business owner race and ethnicity, which shows that businesses owned by historically underrepresented groups earned more through federal contracts across every category. Agencies awarded $76.2 billion to small disadvantaged businesses, the most ever, surpassing the Biden administration\u2019s goal of 12%. The White House set a 15% goal for 2025.nn\u201cThis represents the third consecutive year of record-breaking awards to SDBs under President Biden, and puts the administration on track to reach the President\u2019s goal of increasing federal contracting dollars to SDBs <a href="https:\/\/whitehouse.us19.list-manage.com\/track\/click?u=c97630621baff8c44fe607661&id=2c712710e8&e=f6e36f0ffb">by 50% by 2025<\/a>,\u201d the White House said in a <a href="https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2024\/04\/29\/fact-sheet-celebrating-national-small-business-week-biden-harris-administration-announces-a-record-in-federal-procurement-dollars-awarded-to-small-businesses\/" target="_blank" rel="noopener">fact sheet<\/a> released today.nnFor example, African-American owned businesses received $10.2 billion in federal contracts in 2023, $800 million more than in 2022. Meanwhile, Hispanic-owned businesses saw their overall contract dollars increase by $943 million to $10.9 billion last year.nn<strong><u>FY23 Federal Contracting Dollars to Minority-Owned Small Businesses:<\/u><\/strong>nn<strong><u>\u00a0<\/u><\/strong>n<table>n<tbody>n<tr>n<td width="83"><strong>Demographic Category<\/strong><\/td>n<td width="68"><strong>FY20<\/strong><\/td>n<td width="72"><strong>FY21<\/strong><\/td>n<td width="74"><strong>FY22<\/strong><\/td>n<td width="75"><strong>FY23<\/strong><\/td>n<td width="100"><strong>$ increase under Biden-Harris Administration (from FY20 to FY23)<\/strong><\/td>n<\/tr>n<tr>n<td width="83"><strong>Black American<\/strong><\/td>n<td width="68">$9.4 billion<\/td>n<td width="72">$9 billion<\/td>n<td width="74">$9.5 billion<\/td>n<td width="75"><strong>$10.2 billion<\/strong><\/td>n<td width="100"><strong>$800 million<\/strong><\/td>n<\/tr>n<tr>n<td width="83"><strong>Hispanic American<\/strong><\/td>n<td width="68">$10 billion<\/td>n<td width="72">$10.3 billion<\/td>n<td width="74">$10.6 billion<\/td>n<td width="75"><strong>$10.9 billion<\/strong><\/td>n<td width="100"><strong>$943 million<\/strong><\/td>n<\/tr>n<tr>n<td width="83"><strong>Asian Americans<\/strong><\/td>n<td width="68">$6.9 billion<\/td>n<td width="72">$7 billion<\/td>n<td width="74">$7.5 billion<\/td>n<td width="75"><strong>$9 billion<\/strong><\/td>n<td width="100"><strong>$2.1 billion<\/strong><\/td>n<\/tr>n<tr>n<td width="83"><strong>Subcontinent Asian American<\/strong><\/td>n<td width="68">$8.7 billion<\/td>n<td width="72">$9.5 billion<\/td>n<td width="74">$10.2 billion<\/td>n<td width="75"><strong>$11.5 billion<\/strong><\/td>n<td width="100"><strong>$2.8 billion<\/strong><\/td>n<\/tr>n<tr>n<td width="83"><strong>Native American<\/strong><\/td>n<td width="68">$15.1 billion<\/td>n<td width="72">$17.4 billion<\/td>n<td width="74">$19 billion<\/td>n<td width="75"><strong>$23.3 billion<\/strong><\/td>n<td width="100"><strong>$8.2 billion<\/strong><\/td>n<\/tr>n<\/tbody>n<\/table>n nnIn addition to beating the SDB goal, the SBA says agencies also exceeded the service-disabled veteran-owned small business goal of 3%. Agencies awarded $31.9 billion, or 5.07% of all contracts to these firms.nnThis also is first time agencies came close to meeting the goal for women-owned small business awards in several years, missing out by less than 1%, while still awarding $30.9 billion to these companies.nnAlong with prime contracts, agencies exceeded their goals in making sure small businesses received subcontracts. SBA says 33.34% of all subcontract dollars went to small companies, more than 2% above the goal for a total of $86.4 billion.nnUnlike with prime contracts, agencies missed all socioeconomic goals under subcontracting except for women-owned small businesses. The women-owned small business goal was 5% and agencies achieved 5.65%, while missing out on the SDB, HUBZone and service-disabled veteran-owned small business goals.nnThis latest scorecard comes when House and Senate lawmakers are pushing SBA to hold agencies more accountable for small business contracting. Sen. Joni Ernst (R-Iowa), ranking member of the Small Business and Entrepreneurship Committee, introduced the Accountability and Clarity in Contracts to Engage Small Suppliers and Small Businesses <a href="https:\/\/federalnewsnetwork.com\/acquisition-policy\/2023\/09\/sen-ernst-to-agencies-no-more-easy-as-on-the-sba-scorecard\/">(ACCESS) Act<\/a> last September to revamp the goaling structure.nnHouse Small Business Committee lawmakers also passed several bills earlier this month to address long-standing concerns like making sure agencies use plain language when writing contracts and bring more transparency to decisions when agencies cancel small business contracts."}};

Agencies, once again, set new records almost across the board for contracting with small businesses in fiscal 2023. New data from the Small Business Administration shows agencies awarded an all-time high of 28.4% of all eligible federal contract dollars to small businesses.

At the same time, SBA’s new small business scorecard data shows agencies met or surpassed governmentwide goals in three of five socio-economic category, including service disabled veteran-owned small businesses.

In all, agencies awarded $178.6 billion to small businesses last year, which is an increase of $15.7 billion from 2022.  The governmentwide small business contracting goal is 23%.  House Small Business Committee lawmakers recently passed a bill to increase that goal to 25%.

FY23 Prime Contracting by Dollars and Percentages for All Categories*:

 

Category Goal 2021 2022 2023
$(B) % $(B) % $(B) %
Small Business 26.02% $154.2 27.23% $162.9 26.50% $178.6 28.35%
Small Disadvantaged Business 10.54% $62.4 11.01% $69.9 11.38% $76.2 12.10%
Service-Disabled Veteran Owned Small Business 4.28% $25.0 4.41% $28.1 4.57% $31.9 5.07%
Women-Owned Small Business 4.85% $26.2 4.63% $28.1 4.57% $30.9 4.91%
HUBZone 2.44% $14.3 2.53% $16.3 2.65% $17.5 2.78%
  • In accordance with federal law, SBA provided double credit for prime contract awards in disaster areas that were awarded as a local area set aside. SBA also included in the calculation of government-wide achievements Department of Energy first-tier subcontracts required to be included by section 318 of the Consolidated Appropriations Act of 2014 (“CAA”), Public Law 113-76.

Overall, SBA says 10 agencies received “A+” grades and two others received “A” grades on the scorecard, including the SBA, the departments of Agriculture Housing and Urban Development, Interior, Homeland Security and Commerce as well as the National Science Foundation, the General Services Administration, the Nuclear Regulatory Commission and the Office of Personnel Management.

The White House and SBA recognized the small business contracting accomplishments during a roundtable today as well as during National Small Business Week, which kicked off yesterday.

As part of the 2023 scorecard, SBA also released contract data broken down by business owner race and ethnicity, which shows that businesses owned by historically underrepresented groups earned more through federal contracts across every category. Agencies awarded $76.2 billion to small disadvantaged businesses, the most ever, surpassing the Biden administration’s goal of 12%. The White House set a 15% goal for 2025.

“This represents the third consecutive year of record-breaking awards to SDBs under President Biden, and puts the administration on track to reach the President’s goal of increasing federal contracting dollars to SDBs by 50% by 2025,” the White House said in a fact sheet released today.

For example, African-American owned businesses received $10.2 billion in federal contracts in 2023, $800 million more than in 2022. Meanwhile, Hispanic-owned businesses saw their overall contract dollars increase by $943 million to $10.9 billion last year.

FY23 Federal Contracting Dollars to Minority-Owned Small Businesses:

 

Demographic Category FY20 FY21 FY22 FY23 $ increase under Biden-Harris Administration (from FY20 to FY23)
Black American $9.4 billion $9 billion $9.5 billion $10.2 billion $800 million
Hispanic American $10 billion $10.3 billion $10.6 billion $10.9 billion $943 million
Asian Americans $6.9 billion $7 billion $7.5 billion $9 billion $2.1 billion
Subcontinent Asian American $8.7 billion $9.5 billion $10.2 billion $11.5 billion $2.8 billion
Native American $15.1 billion $17.4 billion $19 billion $23.3 billion $8.2 billion

 

In addition to beating the SDB goal, the SBA says agencies also exceeded the service-disabled veteran-owned small business goal of 3%. Agencies awarded $31.9 billion, or 5.07% of all contracts to these firms.

This also is first time agencies came close to meeting the goal for women-owned small business awards in several years, missing out by less than 1%, while still awarding $30.9 billion to these companies.

Along with prime contracts, agencies exceeded their goals in making sure small businesses received subcontracts. SBA says 33.34% of all subcontract dollars went to small companies, more than 2% above the goal for a total of $86.4 billion.

Unlike with prime contracts, agencies missed all socioeconomic goals under subcontracting except for women-owned small businesses. The women-owned small business goal was 5% and agencies achieved 5.65%, while missing out on the SDB, HUBZone and service-disabled veteran-owned small business goals.

This latest scorecard comes when House and Senate lawmakers are pushing SBA to hold agencies more accountable for small business contracting. Sen. Joni Ernst (R-Iowa), ranking member of the Small Business and Entrepreneurship Committee, introduced the Accountability and Clarity in Contracts to Engage Small Suppliers and Small Businesses (ACCESS) Act last September to revamp the goaling structure.

House Small Business Committee lawmakers also passed several bills earlier this month to address long-standing concerns like making sure agencies use plain language when writing contracts and bring more transparency to decisions when agencies cancel small business contracts.

The post Agencies set records for small business contracting in 2023 first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/contractsawards/2024/04/agencies-set-records-for-small-business-contracting-in-2023/feed/ 0
Is the AI leash on federal agencies too long? https://federalnewsnetwork.com/artificial-intelligence/2024/04/is-the-ai-leash-on-federal-agencies-too-long/ https://federalnewsnetwork.com/artificial-intelligence/2024/04/is-the-ai-leash-on-federal-agencies-too-long/#respond Fri, 26 Apr 2024 19:39:00 +0000 https://federalnewsnetwork.com/?p=4979004 That new White House guidance on agency use of artificial intelligence embodies guardrails, but also a few opt-out scenarios.

The post Is the AI leash on federal agencies too long? first appeared on Federal News Network.

]]>
var config_4978400 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB5382025217.mp3?updated=1714131469"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Is the AI leash on federal agencies too long?","description":"[hbidcpodcast podcastid='4978400']nnThat new White House guidance on agency use of artificial intelligence: It embodies guardrails, but also a few opt-out scenarios that give agencies plenty of discretion. One analyst thinks it gives them too much discretion. For more on\u00a0<a href="https:\/\/federalnewsnetwork.com\/category\/temin\/tom-temin-federal-drive\/"><em><strong>the Federal Drive with Tom Temin<\/strong><\/em><\/a>, Federal News Network's Eric White spoke to the senior counsel at the Brennan Center for Justice, Amos Toh.nn<em><strong>Interview Transcript:\u00a0<\/strong><\/em>n<blockquote><strong>Amos Toh <\/strong>I think that the OMB memo does provide one of the most robust frameworks for regulating how governments, how federal agencies should regulate their use of AI. But the problem is that this robust framework has major loopholes that government agencies may invoke to avoid the very strong and sensible safeguards that the OMB has outlined. So let's start with the good, for AI that impacts rights and safety. The OMB memo requires agencies to conduct an impact assessment before they deploy the system. During the impact assessment phase they have to consider whether the expected benefits of the system will actually outweigh the costs, including its risks to civil liberties and rights. They also have to assess whether an AI system is better suited to accomplishing the tasks that the agency wishes to accomplish compared to a non AI strategies. So all of these criteria and mechanisms are really in place to compel agencies to think very carefully about deploying AI and whether it's suitable for that function and that task. There's also ongoing risk monitoring that the federal agency must do once they've deployed the system. There are requirements for human training and oversight and transparency and providing notice to people the fact that, by the system, as well as requiring agencies to provide options to opt out of an AI system, and providing AI alternatives to people directly affected by these systems. So there's a lot of good in there. But, there are ways that agencies can exempt themselves from these safeguards. And there are two main ways. One is obtaining a waiver when they determine that the system that complying with these safeguards will somehow impact. So safety or would be an impediment to critical agency operations. And they can also define their AI systems in such a way where they are exempt from the guidance.nn<strong>Eric White <\/strong>So yeah, those are the two critical loopholes that you think. Is your beef with them that they give agency leaders almost a little too much leeway? Because, yeah, I've read that same part of the rules. And yeah, I got a little bit of sense of the implied powers clause from the Constitution there. Just saying kind of describing how leaders can make the decision if they feel the need to almost.nn<strong>Amos Toh <\/strong>Right. So the OMB memo, grants, chief artificial intelligence officers at agencies, which are essentially the agency appointed leads on overseeing the AI systems for that particular agency. It essentially grants CAIO's discretion to apply waivers to the systems, and also to define whether an AI system is a principle or basis for a given agency, decision or action. If it is, then it would be covered by the OMB memo, and the minimum practices would apply if it does not qualify as a principal basis according to the CIO and according to the agency, then it would be exempt from these practices. So that's really kind of the two ways, in which agencies can exempt themselves from the minimum practices. And I think the criteria is highly subjective and potentially also overbroad. Particularly in the law enforcement context, we have great concern that agencies will seek to waive minimum practices in the name of critical law enforcement imperatives. When we've seen time and time again, when agencies don't follow safeguards, that leads to significant impact on civil rights and civil liberties.nn<strong>Eric White <\/strong>So this is all new territory for everybody. I think I get a sense that you're not saying that the waivers aren't unnecessary. There does need to be some sort of escape clause for agencies if they feel the need. But what you're saying is that should those waivers should be under more scrutiny.nn<strong>Amos Toh <\/strong>Well, I do think that there are certain minimum practices. And in the OMB memo, that should never be waived. I do think, for example, that the duty to conduct an impact assessment is before you deploy an AI system is something that should be applied regardless of whether there are emergency circumstances or not. AI can be a very powerful tool that can have a lot of harm in rolling it out without even an assessment of its potential impact on people and rights and safety can really need to mask violations of people's rights and may actually be damaging to safety at scale. So you can imagine an agency, if they need to roll something out quickly, because it's a critical agency operation. And that's happening, and in a limited time frame. They could opt to do a shorter impact assessment and do a more deliberate one later on when there is less time pressure. But to waive that requirement entirely is something that actually can lead to the opposite of what the agency intends, which is that it might not, it may be even counterproductive to the operation that the agency is trying to undertake. So I do think that there are certain requirements that shouldn't be waived. For requirements that arguably waivable, such as certain transparency requirements and kind of public disclosure requirements. I do think that needs to be really combined to instances where the AI system, for example, aspects of the AI system may actually be sensitive, law enforcement or national security information that can be genuinely classified as such. So we've seen a glut of over classification of information in the government. And so there's not a lot of confidence that agencies, will apply classification markings that actually adhere to both the letter and the spirit of classification directives. And I think to OMB's credit, you've said in some of their guidelines that even if some aspects of an AI system may not be disclosed to the public, the agency should make kind of best efforts to disclose the rest of the system that can be and should be disclosed to the public.<\/blockquote>"}};

That new White House guidance on agency use of artificial intelligence: It embodies guardrails, but also a few opt-out scenarios that give agencies plenty of discretion. One analyst thinks it gives them too much discretion. For more on the Federal Drive with Tom Temin, Federal News Network’s Eric White spoke to the senior counsel at the Brennan Center for Justice, Amos Toh.

Interview Transcript: 

Amos Toh I think that the OMB memo does provide one of the most robust frameworks for regulating how governments, how federal agencies should regulate their use of AI. But the problem is that this robust framework has major loopholes that government agencies may invoke to avoid the very strong and sensible safeguards that the OMB has outlined. So let’s start with the good, for AI that impacts rights and safety. The OMB memo requires agencies to conduct an impact assessment before they deploy the system. During the impact assessment phase they have to consider whether the expected benefits of the system will actually outweigh the costs, including its risks to civil liberties and rights. They also have to assess whether an AI system is better suited to accomplishing the tasks that the agency wishes to accomplish compared to a non AI strategies. So all of these criteria and mechanisms are really in place to compel agencies to think very carefully about deploying AI and whether it’s suitable for that function and that task. There’s also ongoing risk monitoring that the federal agency must do once they’ve deployed the system. There are requirements for human training and oversight and transparency and providing notice to people the fact that, by the system, as well as requiring agencies to provide options to opt out of an AI system, and providing AI alternatives to people directly affected by these systems. So there’s a lot of good in there. But, there are ways that agencies can exempt themselves from these safeguards. And there are two main ways. One is obtaining a waiver when they determine that the system that complying with these safeguards will somehow impact. So safety or would be an impediment to critical agency operations. And they can also define their AI systems in such a way where they are exempt from the guidance.

Eric White So yeah, those are the two critical loopholes that you think. Is your beef with them that they give agency leaders almost a little too much leeway? Because, yeah, I’ve read that same part of the rules. And yeah, I got a little bit of sense of the implied powers clause from the Constitution there. Just saying kind of describing how leaders can make the decision if they feel the need to almost.

Amos Toh Right. So the OMB memo, grants, chief artificial intelligence officers at agencies, which are essentially the agency appointed leads on overseeing the AI systems for that particular agency. It essentially grants CAIO’s discretion to apply waivers to the systems, and also to define whether an AI system is a principle or basis for a given agency, decision or action. If it is, then it would be covered by the OMB memo, and the minimum practices would apply if it does not qualify as a principal basis according to the CIO and according to the agency, then it would be exempt from these practices. So that’s really kind of the two ways, in which agencies can exempt themselves from the minimum practices. And I think the criteria is highly subjective and potentially also overbroad. Particularly in the law enforcement context, we have great concern that agencies will seek to waive minimum practices in the name of critical law enforcement imperatives. When we’ve seen time and time again, when agencies don’t follow safeguards, that leads to significant impact on civil rights and civil liberties.

Eric White So this is all new territory for everybody. I think I get a sense that you’re not saying that the waivers aren’t unnecessary. There does need to be some sort of escape clause for agencies if they feel the need. But what you’re saying is that should those waivers should be under more scrutiny.

Amos Toh Well, I do think that there are certain minimum practices. And in the OMB memo, that should never be waived. I do think, for example, that the duty to conduct an impact assessment is before you deploy an AI system is something that should be applied regardless of whether there are emergency circumstances or not. AI can be a very powerful tool that can have a lot of harm in rolling it out without even an assessment of its potential impact on people and rights and safety can really need to mask violations of people’s rights and may actually be damaging to safety at scale. So you can imagine an agency, if they need to roll something out quickly, because it’s a critical agency operation. And that’s happening, and in a limited time frame. They could opt to do a shorter impact assessment and do a more deliberate one later on when there is less time pressure. But to waive that requirement entirely is something that actually can lead to the opposite of what the agency intends, which is that it might not, it may be even counterproductive to the operation that the agency is trying to undertake. So I do think that there are certain requirements that shouldn’t be waived. For requirements that arguably waivable, such as certain transparency requirements and kind of public disclosure requirements. I do think that needs to be really combined to instances where the AI system, for example, aspects of the AI system may actually be sensitive, law enforcement or national security information that can be genuinely classified as such. So we’ve seen a glut of over classification of information in the government. And so there’s not a lot of confidence that agencies, will apply classification markings that actually adhere to both the letter and the spirit of classification directives. And I think to OMB’s credit, you’ve said in some of their guidelines that even if some aspects of an AI system may not be disclosed to the public, the agency should make kind of best efforts to disclose the rest of the system that can be and should be disclosed to the public.

The post Is the AI leash on federal agencies too long? first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/artificial-intelligence/2024/04/is-the-ai-leash-on-federal-agencies-too-long/feed/ 0
GSA’s new approach to small business matchmaking https://federalnewsnetwork.com/contractsawards/2024/04/gsas-new-approach-to-small-business-matchmaking/ https://federalnewsnetwork.com/contractsawards/2024/04/gsas-new-approach-to-small-business-matchmaking/#respond Tue, 23 Apr 2024 16:03:12 +0000 https://federalnewsnetwork.com/?p=4973401 GSA’s Alliant 3 contract includes an evaluation factor to encourage large businesses to meet with small firms in one of 11 emerging technology areas.

The post GSA’s new approach to small business matchmaking first appeared on Federal News Network.

]]>
var config_4973485 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB1761438174.mp3?updated=1713882598"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"GSA\u2019s new approach to small business matchmaking","description":"[hbidcpodcast podcastid='4973485']nnThe General Services Administration is putting the final touches on its solicitation for the Alliant 3 IT services contract.nnBut one of the sections that GSA is already finished with is a new approach to attracting small businesses with new or emerging technology capabilities.nnLarge businesses can get started today on meeting the requirements of GSA\u2019s small business emerging technology solutions engagement requirements under Alliant 3 contract.nnPaul Bowen, the director of the center for GWAC programs at GSA, said this evaluation factor is among the first of its kind.nn\u201cThere's an opportunity for an \u2018other than small business\u2019 offeror to engage with small businesses that have eligible emerging technology solutions in any of these 11 areas. So if I'm an other than small business company, I have the opportunity to go out and interact with up to five small businesses that have emerging technology solutions, meet with them, have them sign a form that shows that we met, we had an engagement and that we spoke,\u201d Bowen said at an event sponsored by ACT-IAC on Friday. \u201cThe small business has to provide the proof that they have the eligible product, and then when the other than small business submits it to GSA. The other than small business would receive 200 points for each of the five engagements up to a total maximum of 1,000 points.\u201dnnAs part of the <a href="https:\/\/buy.gsa.gov\/interact\/community\/193\/activity-feed" target="_blank" rel="noopener">draft solicitation for Alliant 3<\/a> issued last December, GSA detailed this new approach to hold large businesses accountable for learning about small businesses in specific emerging technology areas. The 11 areas included such as big data, cloud, cyber, AI, zero trust and quantum computing.n<h2>GSA highlights 11 emerging tech areas<\/h2>nWhat the small business emerging technology solutions engagement requires is for large businesses to meet with at least five small businesses who work in one of these 11 areas. The 11 emerging tech areas came from work GSA\u2019s IT Category office has been and continues to do.nnBowen said GSA isn\u2019t being prescriptive about how the engagements work or what may or may not come from them.nn\u201cGSA does not dictate how these meetings are set up, how long they last, the terms of them. It's entirely for you to all figure out how you want to do it and to come to terms with each other, whether it's a phone call, whether it's a meeting, whether it's a demonstration, however you work it out, you work it out,\u201d he said. \u201cThere's no expectation that you will have done business in the past. Nor is does it create an obligation in GSA\u2019s eyes that you'll do business together in the future. It's a way to match make.\u201dnnGSA, however, put some parameters on the size of the emerging small businesses. The firm has to have done at least $100,000 worth of business or being a part of the Small Business Innovation Research or Small Business Technology Transfer (SBIR\/STTR) programs.nnUnder the terms of the program, the large business may only get credit for meeting with a different small business for all five engagements and can\u2019t meet with small businesses in any of the 11 categories like cyber or AI more than twice. Bowen said that means if large company X meets with two different AI companies, then they have to pick three other emerging technology areas like cloud or health IT for their other meetings.n<h2>Matchmaking made easier<\/h2>nSmall firms bidding on Alliant 3 do not have to participate in this part of the evaluation. GSA says they would receive the 1,000 points automatically.nnBowen said GSA\u2019s decision to take this approach made sense for several reasons.nnFirst, it just made sense to make small business matchmaking part of the evaluation factor just made sense.nn\u201cWe know that small businesses have really been leaders in emerging technology, which is such a focus for everyone, including the government. For us to have an evaluated factor where other than small business offers on Alliant 3 have a scored element where they can go out and meet with small businesses with emerging technology solutions is a win-win for everyone,\u201d Bowen said. \u201cIt's a win-win for the small businesses with the emerging technology because they have the ability to go meet with these companies where previously may have been difficult to get in the door. It's a win for the other than small business offers because they get to learn about these technologies. They demonstrate to the government that they have the ability to go out and find small businesses with emerging technology because so much of the emerging technology is being done to almost the garage level and above at this point.\u201dnnBowen said this approach also gives the <a href="https:\/\/federalnewsnetwork.com\/reporters-notebook\/2023\/07\/is-gsas-alliant-3-vehicle-tilted-too-much-to-small-very-large-contractors\/">small businesses some leverage<\/a> with the large firms in terms of getting meetings and explaining their technologies and value.nnIn addition to this 1,000 point evaluation factor, Bowen said GSA also will hold vendors accountable for meeting their subcontracting goals as part of the contract.nnGSA expects to issue the <a href="https:\/\/federalnewsnetwork.com\/reporters-notebook-jason-miller\/2023\/07\/busy-federal-fourth-quarter-to-bleed-into-just-as-crazy-first-quarter-of-2024\/">final solicitation for Alliant 3<\/a> toward the end of May or early June.nnOne big change to the Alliant 3 is the number of awards GSA is expecting to make. Bowen said GSA is targeting about 76 awards, which is up from the 60 awards it made under Alliant 2 back in 2018.nnOne reason GSA is looking to make a larger number of awards is the number of contractors who ended up leaving Alliant 2. GSA started with 60 awards and has lost 22 over the last six years. Of those 22, 11 were lost to mergers and acquisitions and another 11 to the companies \u201cvolunteered\u201d to leave the contract as they were not meeting specific bidding and winning requirements.nnThere now are 38 vendors under Alliant 2 and GSA expects the larger number of awardees to provide better and more competition.nn[caption id="attachment_4973429" align="aligncenter" width="1292"]<img class="wp-image-4973429 size-full" src="https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2024\/04\/alliant-2-graphic-april-2024-1.jpg" alt="" width="1292" height="400" \/> Source: GSA D2D Dashboard April 2024.[\/caption]nnAlliant 2 remains a popular contract among agencies, adding a lot of focus and excitement on Alliant 3.nnGSA data shows agencies obligated more than $8.6 billion across 117 task orders in 2022. Since <a href="https:\/\/federalnewsnetwork.com\/contracting\/2017\/11\/as-it-modernization-takes-center-stage-gsa-awards-alliant-2-contract-to-be-flexible-meet-future-needs-of-agency-customers\/">GSA awarded Alliant 2<\/a> in 2018, agencies have obligated more than $26 billion.nnThe popularity of Alliant 2 caused GSA in August 2022 to increase the ceiling of Alliant 2 to $75 billion from $50 billion because it saw the increasing spending trends.nn[caption id="attachment_4973405" align="aligncenter" width="1288"]<img class="wp-image-4973405 size-full" src="https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2024\/04\/alliant-2-graphic-2-april-2024.jpg" alt="" width="1288" height="320" \/> Source: GSA D2D Dashboard April 2024.[\/caption]nnOver the last four or so years, Alliant 2 has been a go-to contract for many of the major and high dollar programs agencies have pursued. The average task order under Alliant 2 is around $120 million.nnIndustry and GSA expects Alliant 3 will be just as popular with spending continuing to increase."}};

The General Services Administration is putting the final touches on its solicitation for the Alliant 3 IT services contract.

But one of the sections that GSA is already finished with is a new approach to attracting small businesses with new or emerging technology capabilities.

Large businesses can get started today on meeting the requirements of GSA’s small business emerging technology solutions engagement requirements under Alliant 3 contract.

Paul Bowen, the director of the center for GWAC programs at GSA, said this evaluation factor is among the first of its kind.

“There’s an opportunity for an ‘other than small business’ offeror to engage with small businesses that have eligible emerging technology solutions in any of these 11 areas. So if I’m an other than small business company, I have the opportunity to go out and interact with up to five small businesses that have emerging technology solutions, meet with them, have them sign a form that shows that we met, we had an engagement and that we spoke,” Bowen said at an event sponsored by ACT-IAC on Friday. “The small business has to provide the proof that they have the eligible product, and then when the other than small business submits it to GSA. The other than small business would receive 200 points for each of the five engagements up to a total maximum of 1,000 points.”

As part of the draft solicitation for Alliant 3 issued last December, GSA detailed this new approach to hold large businesses accountable for learning about small businesses in specific emerging technology areas. The 11 areas included such as big data, cloud, cyber, AI, zero trust and quantum computing.

GSA highlights 11 emerging tech areas

What the small business emerging technology solutions engagement requires is for large businesses to meet with at least five small businesses who work in one of these 11 areas. The 11 emerging tech areas came from work GSA’s IT Category office has been and continues to do.

Bowen said GSA isn’t being prescriptive about how the engagements work or what may or may not come from them.

“GSA does not dictate how these meetings are set up, how long they last, the terms of them. It’s entirely for you to all figure out how you want to do it and to come to terms with each other, whether it’s a phone call, whether it’s a meeting, whether it’s a demonstration, however you work it out, you work it out,” he said. “There’s no expectation that you will have done business in the past. Nor is does it create an obligation in GSA’s eyes that you’ll do business together in the future. It’s a way to match make.”

GSA, however, put some parameters on the size of the emerging small businesses. The firm has to have done at least $100,000 worth of business or being a part of the Small Business Innovation Research or Small Business Technology Transfer (SBIR/STTR) programs.

Under the terms of the program, the large business may only get credit for meeting with a different small business for all five engagements and can’t meet with small businesses in any of the 11 categories like cyber or AI more than twice. Bowen said that means if large company X meets with two different AI companies, then they have to pick three other emerging technology areas like cloud or health IT for their other meetings.

Matchmaking made easier

Small firms bidding on Alliant 3 do not have to participate in this part of the evaluation. GSA says they would receive the 1,000 points automatically.

Bowen said GSA’s decision to take this approach made sense for several reasons.

First, it just made sense to make small business matchmaking part of the evaluation factor just made sense.

“We know that small businesses have really been leaders in emerging technology, which is such a focus for everyone, including the government. For us to have an evaluated factor where other than small business offers on Alliant 3 have a scored element where they can go out and meet with small businesses with emerging technology solutions is a win-win for everyone,” Bowen said. “It’s a win-win for the small businesses with the emerging technology because they have the ability to go meet with these companies where previously may have been difficult to get in the door. It’s a win for the other than small business offers because they get to learn about these technologies. They demonstrate to the government that they have the ability to go out and find small businesses with emerging technology because so much of the emerging technology is being done to almost the garage level and above at this point.”

Bowen said this approach also gives the small businesses some leverage with the large firms in terms of getting meetings and explaining their technologies and value.

In addition to this 1,000 point evaluation factor, Bowen said GSA also will hold vendors accountable for meeting their subcontracting goals as part of the contract.

GSA expects to issue the final solicitation for Alliant 3 toward the end of May or early June.

One big change to the Alliant 3 is the number of awards GSA is expecting to make. Bowen said GSA is targeting about 76 awards, which is up from the 60 awards it made under Alliant 2 back in 2018.

One reason GSA is looking to make a larger number of awards is the number of contractors who ended up leaving Alliant 2. GSA started with 60 awards and has lost 22 over the last six years. Of those 22, 11 were lost to mergers and acquisitions and another 11 to the companies “volunteered” to leave the contract as they were not meeting specific bidding and winning requirements.

There now are 38 vendors under Alliant 2 and GSA expects the larger number of awardees to provide better and more competition.

Source: GSA D2D Dashboard April 2024.

Alliant 2 remains a popular contract among agencies, adding a lot of focus and excitement on Alliant 3.

GSA data shows agencies obligated more than $8.6 billion across 117 task orders in 2022. Since GSA awarded Alliant 2 in 2018, agencies have obligated more than $26 billion.

The popularity of Alliant 2 caused GSA in August 2022 to increase the ceiling of Alliant 2 to $75 billion from $50 billion because it saw the increasing spending trends.

Source: GSA D2D Dashboard April 2024.

Over the last four or so years, Alliant 2 has been a go-to contract for many of the major and high dollar programs agencies have pursued. The average task order under Alliant 2 is around $120 million.

Industry and GSA expects Alliant 3 will be just as popular with spending continuing to increase.

The post GSA’s new approach to small business matchmaking first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/contractsawards/2024/04/gsas-new-approach-to-small-business-matchmaking/feed/ 0
CYBERCOM embraces the non-traditional as acquisition program grows https://federalnewsnetwork.com/defense-news/2024/04/cybercom-embraces-the-non-traditional-as-acquisition-program-grows/ https://federalnewsnetwork.com/defense-news/2024/04/cybercom-embraces-the-non-traditional-as-acquisition-program-grows/#respond Mon, 15 Apr 2024 21:53:57 +0000 https://federalnewsnetwork.com/?p=4963728 A CYBERCOM acquisition leader says she doesn’t want the command’s burgeoning buying program to be ‘stodgy and antiquated.'

The post CYBERCOM embraces the non-traditional as acquisition program grows first appeared on Federal News Network.

]]>
U.S. Cyber Command is aiming to expand its acquisition team and rely on flexible buying strategies as CYBERCOM becomes a focal point of cyber procurement in the Defense Department.

The command was initially granted limited acquisition authority in fiscal 2016, with 10 billets and $75 million in buying authority over five years. Congress has since lifted the command’s spending limitations and restrictions.

Courtney Maggiulli, the program executive officer for cyber, J9 acquisition and technology at CYBERCOM, said her PEO is aiming to add 50 billets this year.

“So we are staffing up for a right sized and ready workforce, and it’s a pretty exciting place,” Maggiulli said at the CYBERCOM legal conference last week.

Earlier this year, the command was also designated as a federal laboratory. The designation gives CYBERCOM more authorities to work with industry and academia on technology research. Additionally, it also has “enhanced budgetary control,” meaning it has a greater say in how DoD makes decisions about cyber programs and investments.

“So we’re expanding our ability to acquire cyber goods, cyber services for the DoD in an integrated and holistic way,” Maggiulli said.

And CYBERCOM is also building out a program office to oversee and integrate the “Joint Cyber Warfighting Architecture,” a collective term for the cyber products and services used across the military services by the 133-team Cyber Mission Force.

“Integration is crucial, because things are changing every day,” Maggiulli said. “And we have to be unified. We bring together the best in breed of all the different tool capabilities. And most importantly, it’s the talent of the people across the services as well.”

But as it builds out its acquisition program, Maggiulli said CYBERCOM is acutely aware it can’t rely on the traditional DoD acquisition system to buy and integrate new cyber capabilities.

“The cyber domain is different,” she said. “It’s fast, it’s rapid. So we don’t have the ability to take the time that you would normally put into building a tank or a fighter jet or putting up a satellite in 10 years. We don’t have 10 years to wait.”

She pointed to the command’s early collaboration with the Defense Innovation Unit to procure “Hunt Forward” cyber mission kits using DIU’s prototyping process. DIU typically uses Other Transaction Agreements that aren’t governed by the Federal Acquisition Regulation.

“We are committed through what our lab is doing and through our teams of professionals and then through our partnerships with folks like DIU to growing that innovation at the command,” Maggiulli said.

CYBERCOM is also leaning on DoD’s Adaptive Acquisition Framework to tailor its procurement strategies for the cyber domain.

Maggiulli referenced both the software acquisition pathway and the middle tier of acquisition pathway as “allowable ways to pursue acquisition that have strategies that are more responsive and tailored to the types of acquisitions we’re doing.” The software pathway uses agile development and DevSecOps practices, while the middle-tier authority is used to quickly prototype and field new capabilities.

“We’re being given flexibilities and tools by Congress that allow us to be faster and more responsive for the type of acquisition we’re doing with cyber,” Maggiulli said.

A key aspect of CYBERCOM’s acquisition ambitions will be training and empowering its growing acquisition workforce, she added. The command is using training programs through Defense Acquisition University to build an education and culture around what Maggiulli hopes is a creative acquisition program.

“It’s not a stodgy and antiquated and outdated acquisition model that we want people to come in with,” she said. “We really want to leverage these tools that we’ve been given with a workforce that knows how to use them strategically and effectively.”

The post CYBERCOM embraces the non-traditional as acquisition program grows first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/defense-news/2024/04/cybercom-embraces-the-non-traditional-as-acquisition-program-grows/feed/ 0
Army has burned the software development bridges behind them https://federalnewsnetwork.com/ask-the-cio/2024/04/army-has-burned-the-software-development-bridges-behind-them/ https://federalnewsnetwork.com/ask-the-cio/2024/04/army-has-burned-the-software-development-bridges-behind-them/#respond Mon, 15 Apr 2024 12:19:48 +0000 https://federalnewsnetwork.com/?p=4962829 Margaret Boatner, deputy assistant secretary of the Army for strategy and acquisition reform, said new approaches to buying software already are paying off.

The post Army has burned the software development bridges behind them first appeared on Federal News Network.

]]>
var config_4962847 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB2683870030.mp3?updated=1713183115"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2018\/12\/AsktheCIO1500-150x150.jpg","title":"Army has burned the software development bridges behind them","description":"[hbidcpodcast podcastid='4962847']nnThe Army has seen enough from its testing of the Adaptive Acquisition Framework to know what its future looks like.nnAnd that future is around six pathways that moves the services away from a one-size-fits all approach to buying and managing technology.nnMargaret Boatner, the deputy assistant secretary of the Army for strategy and acquisition reform, said these six pathways outlined in the Defense Department\u2019s <a href="https:\/\/federalnewsnetwork.com\/defense-industry\/2020\/09\/dod-takes-next-step-in-acquisition-reform-renews-calls-for-contractor-stimulus\/">released in 2020<\/a> have shown enough promise to force the service to change its approach to how it buys and develops software.nn[caption id="attachment_4434599" align="alignright" width="300"]<img class="size-medium wp-image-4434599" src="https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/01\/margaret-boatner-e1673995409964-300x225.jpg" alt="" width="300" height="225" \/> Margaret Boatner, deputy assistant secretary of the Army for strategy and acquisition reform[\/caption]nn\u201cI think two really key things about the software pathway. One, it eliminates a lot of bureaucracy and process that is typical of the traditional acquisition process. For example, we can operate totally outside of the traditional requirements process. There's a lot less documentation and review requirements to start a program on the software pathway,\u201d Boatner said on <a href="https:\/\/federalnewsnetwork.com\/category\/radio-interviews\/ask-the-cio\/">Ask the CIO<\/a>. \u201cBut even more importantly, what it does do is it actually requires us to use modern software practices. It's not an option. We have to use agile, DevSecOps, continuous integration, continuous delivery (CI\/CD) and those types of things. We have to deliver capabilities within one year and annually thereafter. So really it\u2019s forcing faster cycle times then what we employ traditionally when you look at our software systems.\u201dnnShe added the Army typically released new features or capabilities every three to four years in traditional waterfall based programs. But now with the software pathway, it\u2019s accelerated the release of new services to every 9-to-12 months, at the very most with a goal of releasing every six months or sooner.nnWhile the Army is far from industry standards of releasing new capabilities every few weeks or even more quickly, she said these initial changes <a href="https:\/\/federalnewsnetwork.com\/acquisition\/2023\/04\/army-moves-forward-with-streamlining-software-acquisition\/">show real progress<\/a> in changing the culture and outcomes.nn\u201cI do think it's a sign that we have adapted and are adapting to more of these agile processes that are required by the software pathway. The Army has 14 programs on the pathway now, but we are actively in the process of transitioning more over including more of our traditional defense business systems because those are now allowed to transition and pivot over to the software pathway as well,\u201d she said. \u201cFor any of our software intensive capabilities, we want to get on the software pathway because of all of these unique flexibilities and the fact that it forces us to align to some of these industry best practices.\u201dnnDoD\u2019s <a href="https:\/\/aaf.dau.edu\/" target="_blank" rel="noopener">Adaptive Acquisition Framework<\/a> splits the acquisition approaches into six pathways:n<ul>n \t<li>Major capability acquisition (the pathway that will handle most of the military\u2019s traditional hardware procurements).<\/li>n \t<li>Urgent capabilities.<\/li>n \t<li>Software (including, in some cases, software that will be part of major weapons systems).<\/li>n \t<li>Business systems.<\/li>n \t<li>Services.<\/li>n \t<li>Middle-tier acquisitions that use the recently-enacted \u201cSection 804\u201d authority for rapid fielding and rapid prototyping.<\/li>n<\/ul>nUnder AAF, the objective is to flip the script: Start with a baseline of rules that only really matter for the pathway that best fits their program, and \u201ctailor-in\u201d whichever additional requirements and <a href="https:\/\/federalnewsnetwork.com\/on-dod\/2021\/03\/dods-new-adaptive-acquisition-framework-takes-new-approach-to-tailoring-procurement-strategies\/">acquisition best practices<\/a> fit the actual product or service they\u2019re buying or building.n<h2>Reducing documentation requirements<\/h2>nBoatner said the AAF is changing the Army\u2019s mindset in two main ways.nn\u201cFirst, it really allows us to tailor acquisition approaches. So moving away from the one size fits all approach, we now have the ability to choose between six different and distinct pathways based on the characteristics of our program,\u201d she said. \u201cWe could choose one or we could choose multiple pathways depending on the needs of our program. It also emphasizes tailoring-in versus tailoring-out of other requirements. So instead of having to comply with 35 documentation and review requirements for everything we get to say, \u2018hey, this document in this review requirement is appropriate based on the program.\u2019 The second thing that it does really is empower our program managers. We can delegate decisions down as much as possible, including the choice of the pathway, including what documents review requirements. It\u2019s really pushing down a lot of that decision making which helps to streamline the process.\u201dnnThe expanded use of the AAF also is part of a broader effort across the Army to change the way it manages and buys software.nnSecretary Christine Wormuth issued a\u00a0<a href="https:\/\/www.army.mil\/article\/274356\/army_announces_new_policy_to_drive_adoption_of_agile_software_development_practices">new agile software policy<\/a>\u00a0detailing five changes to reform what she called the institutional processes of the Army.nnLeo Garciga, the Army\u2019s chief information officer, <a href="https:\/\/federalnewsnetwork.com\/cloud-computing\/2024\/03\/dod-cloud-exchange-2024-armys-leo-garciga-on-clearing-obstacles-to-digital-transformation\/">said recently<\/a> the policy changes will help the service streamline its ability to build contracts based on agile and DevSecOps methodologies.nnBoatner said these changes will not happen overnight, recognizing the Army has built up these habits and processes over the course of decades.nn\u201cWe'll do a full communication blitz, where we go to all of the program executive office shops and all of the contracting shops to make sure they understand the direction that we are moving in. We're also trying to centralize expertise in a couple of places. Contracting, for example, is one way that we're trying to centralize this expertise, such that contracts will flow through the same group of people who really can become very, very savvy in this, who are more skilled in in writing and executing contracts or agreements for software development efforts,\u201d she said. \u201cWe're trying to pool another group of experts that are going to help folks from the headquarters level as they do their software development efforts, more from the technical software development side. It\u2019s really making sure we have the right expertise in the right place to actually execute a lot of these things, in addition to all of the communication and the roadshows that we, of course, plan to do.\u201dnnShe added her office also will work with the larger cybersecurity and test and evaluation communities to ensure they understand how the AAF works and what it means for their specific areas.nn "}};

The Army has seen enough from its testing of the Adaptive Acquisition Framework to know what its future looks like.

And that future is around six pathways that moves the services away from a one-size-fits all approach to buying and managing technology.

Margaret Boatner, the deputy assistant secretary of the Army for strategy and acquisition reform, said these six pathways outlined in the Defense Department’s released in 2020 have shown enough promise to force the service to change its approach to how it buys and develops software.

Margaret Boatner, deputy assistant secretary of the Army for strategy and acquisition reform

“I think two really key things about the software pathway. One, it eliminates a lot of bureaucracy and process that is typical of the traditional acquisition process. For example, we can operate totally outside of the traditional requirements process. There’s a lot less documentation and review requirements to start a program on the software pathway,” Boatner said on Ask the CIO. “But even more importantly, what it does do is it actually requires us to use modern software practices. It’s not an option. We have to use agile, DevSecOps, continuous integration, continuous delivery (CI/CD) and those types of things. We have to deliver capabilities within one year and annually thereafter. So really it’s forcing faster cycle times then what we employ traditionally when you look at our software systems.”

She added the Army typically released new features or capabilities every three to four years in traditional waterfall based programs. But now with the software pathway, it’s accelerated the release of new services to every 9-to-12 months, at the very most with a goal of releasing every six months or sooner.

While the Army is far from industry standards of releasing new capabilities every few weeks or even more quickly, she said these initial changes show real progress in changing the culture and outcomes.

“I do think it’s a sign that we have adapted and are adapting to more of these agile processes that are required by the software pathway. The Army has 14 programs on the pathway now, but we are actively in the process of transitioning more over including more of our traditional defense business systems because those are now allowed to transition and pivot over to the software pathway as well,” she said. “For any of our software intensive capabilities, we want to get on the software pathway because of all of these unique flexibilities and the fact that it forces us to align to some of these industry best practices.”

DoD’s Adaptive Acquisition Framework splits the acquisition approaches into six pathways:

  • Major capability acquisition (the pathway that will handle most of the military’s traditional hardware procurements).
  • Urgent capabilities.
  • Software (including, in some cases, software that will be part of major weapons systems).
  • Business systems.
  • Services.
  • Middle-tier acquisitions that use the recently-enacted “Section 804” authority for rapid fielding and rapid prototyping.

Under AAF, the objective is to flip the script: Start with a baseline of rules that only really matter for the pathway that best fits their program, and “tailor-in” whichever additional requirements and acquisition best practices fit the actual product or service they’re buying or building.

Reducing documentation requirements

Boatner said the AAF is changing the Army’s mindset in two main ways.

“First, it really allows us to tailor acquisition approaches. So moving away from the one size fits all approach, we now have the ability to choose between six different and distinct pathways based on the characteristics of our program,” she said. “We could choose one or we could choose multiple pathways depending on the needs of our program. It also emphasizes tailoring-in versus tailoring-out of other requirements. So instead of having to comply with 35 documentation and review requirements for everything we get to say, ‘hey, this document in this review requirement is appropriate based on the program.’ The second thing that it does really is empower our program managers. We can delegate decisions down as much as possible, including the choice of the pathway, including what documents review requirements. It’s really pushing down a lot of that decision making which helps to streamline the process.”

The expanded use of the AAF also is part of a broader effort across the Army to change the way it manages and buys software.

Secretary Christine Wormuth issued a new agile software policy detailing five changes to reform what she called the institutional processes of the Army.

Leo Garciga, the Army’s chief information officer, said recently the policy changes will help the service streamline its ability to build contracts based on agile and DevSecOps methodologies.

Boatner said these changes will not happen overnight, recognizing the Army has built up these habits and processes over the course of decades.

“We’ll do a full communication blitz, where we go to all of the program executive office shops and all of the contracting shops to make sure they understand the direction that we are moving in. We’re also trying to centralize expertise in a couple of places. Contracting, for example, is one way that we’re trying to centralize this expertise, such that contracts will flow through the same group of people who really can become very, very savvy in this, who are more skilled in in writing and executing contracts or agreements for software development efforts,” she said. “We’re trying to pool another group of experts that are going to help folks from the headquarters level as they do their software development efforts, more from the technical software development side. It’s really making sure we have the right expertise in the right place to actually execute a lot of these things, in addition to all of the communication and the roadshows that we, of course, plan to do.”

She added her office also will work with the larger cybersecurity and test and evaluation communities to ensure they understand how the AAF works and what it means for their specific areas.

 

The post Army has burned the software development bridges behind them first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/ask-the-cio/2024/04/army-has-burned-the-software-development-bridges-behind-them/feed/ 0
GSA’s commercial platforms program to grow by five providers https://federalnewsnetwork.com/contractsawards/2024/03/gsas-commercial-platforms-program-to-grow-by-five-providers/ https://federalnewsnetwork.com/contractsawards/2024/03/gsas-commercial-platforms-program-to-grow-by-five-providers/#respond Wed, 27 Mar 2024 22:03:31 +0000 https://federalnewsnetwork.com/?p=4942098 The General Services Administration made eight awards under the next generation Commercial Platform Initiative, including four to small businesses.

The post GSA’s commercial platforms program to grow by five providers first appeared on Federal News Network.

]]>
Agencies will soon have more choices to buy commercial products from under the General Services Administration’s Commercial Platform program.

GSA is expanding the number of providers from three to eight, including six new ones.

Along with current platform providers Amazon Business and Fisher Scientific, GSA awarded spots on the next generation Commercial Platform Initiative (CPI) contract to:

  • e-Procurement Services
  • Grainger
  • Noble Supply & Logistics
  • Pacific Ink
  • Social Glass
  • Staples

Four of the awardees, ePS, Noble Supply, Pacific Ink and Social Glass, are small businesses, opening the door for agencies to obtain small business credit for these small dollar buys.

“This is about meeting our customers where they are with a modernized user experience and streamlined process for government purchase cardholders,” said Tom Howder, the acting Federal Acquisition Service commissioner, in a release.

GSA created the CPI program under a proof-of-concept moniker with awards to Amazon, Fischer and Overstock Government in 2020 under direction from Congress with a goal of capturing data on and managing products under the micro purchase threshold of $10,000. Initially, GSA thought the market was about $6 billion, but came down in the last few years to the potential market being about $500 million.

Overstock Government decided not to bid on the next generation platform, sources say.

Lawmakers detailed its desire for GSA to pilot online commercial platforms in Section 846 of the 2018 Defense Authorization bill. The House Armed Services Committee’s initial goal was to make federal procurement less complex and more competitive through the use of commercial platforms.

“GSA’s announcement of eight contracts awards for the commercial platform initiative represents the passing of a significant milepost on its journey to bring enhanced electronic commerce to agencies,” said Roger Waldron, president of the Coalition for Government Procurement, in an email to Federal News Network. “Collectively, these contracts represent a streamlined channel through which agencies can acquire commercial off the shelf products quickly. They also put competitive pressure on the Schedules program to improve its administrative efficiency, which is a positive result that will help buyers and sellers in the market.”

The awards come at more and more agencies are using the initial three platforms, though data shows Amazon Business received the vast majority of the orders, accounting for 96% of all orders in fiscal 2022, according to an August 2023 report from the Government Accountability Office.

GSA says for 2023, 34 agencies spent $80 million, which is double the amount of money spent in 2022.

GSA also says total orders also increased to 305,000 from 105,000 in 2022, and 52% of all users were repeat buyers and agencies spent on average between $250-$350.

Source: GSA

“This is a pivotal turning point in the Commercial Platforms Program as we expand the number of platforms available, including a number of small business awardees,” said Keil Todd, the Commercial Platforms program manager, in the release. “We’re excited to move out on the next-generation of this program to further our commitment to agencies in helping them get the products they need to support their missions.”

With the additional companies GSA is adding, agencies have access to buy from well-known diverse companies like Amazon Business, Fischer Scientific, Staples and Grainger that provide a large variety of products, but from the four small companies.

Noble Supply, for instance, provides the Defense Department with access to products from 13,000 companies.  Pacific Ink offers office supplies and Social Glass provides access to small purchases across 50,000 products. And ePS  filed a protest of the solicitation in December only to gain corrective action and win an award.  ePS is a platform providing access to small business suppliers.

“We are looking forward to assisting GSA in meeting the goals of the Commercial Platform program. This award allows us to bring other federal agencies the benefits that federal buyers are currently experiencing within the e-Procurement Services (ePS)  Army and Air Force eMarketplace programs,” said David Saroli, CEO of e-Procurement Services (ePS), in an email to Federal News Network. “Being part of the Commercial Platform program will also help increase the growth our small business suppliers are currently experiencing through the Army and Air Force ePS e-marketplaces.”

The journey to this award, and it’s unclear if GSA has crossed the finish line given several unknown factors like how many bidders there were and if any that were unsuccessful would file a protest, was not an easy one. GSA took heat for initially overlooking, or ignoring, the requirement to comply with the Javits-Wagner-O’Day (JWOD) Act. The 1938 law mandates the AbilityOne Commission publish a procurement list that identifies commodities and services that the commission has determined are suitable to be furnished to the government by companies who employ people with disabilities. Agencies must buy these specific products and services unless there are specific circumstances that require exceptions.

GSA ended up fixing the solicitation to satisfy the protestors’ concerns.

The post GSA’s commercial platforms program to grow by five providers first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/contractsawards/2024/03/gsas-commercial-platforms-program-to-grow-by-five-providers/feed/ 0
GSA aims to make buying SaaS easier through new policy https://federalnewsnetwork.com/acquisition-policy/2024/03/gsa-aims-to-make-buying-saas-easier-through-new-policy/ https://federalnewsnetwork.com/acquisition-policy/2024/03/gsa-aims-to-make-buying-saas-easier-through-new-policy/#respond Fri, 15 Mar 2024 21:38:27 +0000 https://federalnewsnetwork.com/?p=4927842 GSA issued an acquisition letter detailing the certain conditions when contracting officers can buy cloud services with upfront payments.

The post GSA aims to make buying SaaS easier through new policy first appeared on Federal News Network.

]]>
The effort to make buying cloud services easier for agencies and more in line with industry standards continues with yet another acquisition workaround.

The General Services Administration issued its second acquisition letter in just over two years, giving its contracting officers permission to move closer to buying cloud services “by the drink,” or through a consumption based model.

Jeff Koses, GSA’s senior procurement executive, wrote that contracting officers, under certain conditions, can use upfront payments to buy software-as-a-service and it doesn’t violate federal procurement law that prohibits advanced payments.

“In the context of software licenses delivered or accessed via SaaS, payment is often made ‘upfront,’ meaning that payment is made contemporaneously with receipt of the software license and the beginning of the license service term. GSA contracting officers have been asked whether such upfront payment is considered an advance payment. It is not,” Koses wrote. “The central distinction is the contemporaneous access.”

Koses wrote advance payment is a specific type of contract financing method where payments are made prior to delivery or completion of the product or a service. It is not allowed under the Anti-Deficiency.

Technical workaround needed

Rich Beutel, founder of Cyrrus Analytics and a federal procurement expert, said GSA is leaning on a technical workaround given the lack of attention this topic has received from Congress.

“The acquisition letter skirts the Anti-Deficiency Act prohibition by highlighting the requirement for contemporaneous delivery of the software, thus there is no advance procurement delivered without an applicable preexisting appropriation,” he said.

Koses said there are six criteria for the acquisition to meet for contracting officers not to have to worry about the advanced payment rule:

  • Access to the software is granted contemporaneously with payment (i.e., delivery of the license is made contemporaneously with payment);
  • The license is acquired on a fixed-price or fixed-price with economic price adjustment basis even if other portions of the task order or contract are not fixed price;
  • The license is priced at a single seat, multi-seat, unit or subscription price covering a fixed term, defined as “a limited period of time;”
  • The license’s pricing/billing model allows for no utilization or consumption metric other than quantity to affect the costs incurred over the negotiated term;
  • The license does not require any upfront payment other than the fixed seat, unit, or subscription cost as a prerequisite for access or a pricing discount;
  • Within end user or other license agreements, the license service is continuous and uninterrupted for the negotiated term of access to the license.

Larry Allen, president of Allen Federal Business Partners and a procurement expert, praised GSA’s changes.

“I think that this is a win for enhanced competition, especially for small businesses that may have had to previously finance software acquisitions and have to offer higher prices as a result,” he said. “This move should increase competition and drive better pricing. This is a win for common sense in government acquisition.”

GSA recognized the problem

Beutel, who praised GSA’s 2021 acquisition letter that created new ordering procedures to allow the procurement of cloud offerings using a consumption-based pricing formula, said Congress still must amend the Anti-Deficiency Act to allow for industry to bill in arrears for cloud services on a consumption basis.

“Politically, the appropriations committees would likely be very skeptical of such a proposal, despite its clear economic value,” he said. “Over the last several years, we have addressed the need for government to have the legal authority to adopt true consumption based pricing, so as to be able to buy IT capacity instantly as the need arises. This could be achieved through the use of working capital funds and other technical workarounds, as GSA has adopted in the context of certain schedule based cloud procurements.”

This specific issue is causing agencies to have to pay as much as 25% more for cloud services and caused the limited use of the Defense Enterprise Office Solutions (DEOS) contract from the Defense Information Systems Agency.

GSA recognized this problem and asked for industry feedback last July. It issued a request for information asking for industry feedback on SaaS pricing best practices and what are its options better align the schedules with industry practices for pricing and invoicing term-based software.

The post GSA aims to make buying SaaS easier through new policy first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/acquisition-policy/2024/03/gsa-aims-to-make-buying-saas-easier-through-new-policy/feed/ 0
Should the Defense Department get more mixed up with mergers and acquisitions? https://federalnewsnetwork.com/acquisition/2024/03/should-the-defense-department-get-more-mixed-up-with-mergers-and-acquisitions/ https://federalnewsnetwork.com/acquisition/2024/03/should-the-defense-department-get-more-mixed-up-with-mergers-and-acquisitions/#respond Thu, 14 Mar 2024 19:15:24 +0000 https://federalnewsnetwork.com/?p=4926087 The defense industrial base roster of companies keeps shrinking, and supply chain snags have become constant.

The post Should the Defense Department get more mixed up with mergers and acquisitions? first appeared on Federal News Network.

]]>
var config_4925765 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB1694273496.mp3?updated=1710431895"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"Should the Defense Department get more mixed up with mergers and acquisitions?","description":"[hbidcpodcast podcastid='4925765']nnThe defense industrial base roster of companies keeps shrinking, and supply chain snags have become\u00a0constant. Now at least some members of Congress have asked whether the Defense Department should step in more often when DIB companies merger or acquire one other.\u00a0<a href="https:\/\/federalnewsnetwork.com\/category\/temin\/tom-temin-federal-drive\/"><em><strong>The Federal Drive with Tom Temin<\/strong><\/em><\/a> gets more now from Democratic Congressman, John Garamendi, ranking member of the House Armed Services Subcommittee on Readiness.nn<strong><em>Interview Transcript:\u00a0<\/em><\/strong>n<blockquote><strong>Tom Temin <\/strong>Your letter to Secretary Austin was widely reported. What do you feel DoD should do with respect to mergers and acquisitions, which occur, I think, more often than people may realize.nn<strong>John Garamendi <\/strong>Well, let's start with competition is absolutely critical in every part of the American economy. Unfortunately, what we're finding in the defense industry is that competition is all but disappeared. The companies do not compete with each other. The five majors don't. They basically wind up with no bid, no competitive contracts for multibillion dollar programs. For example, the Sentinel program. I was a no bid, no competition, $130 billion contract. This is absolutely unacceptable. And that's not the only one. We can go to numerous programs. The acquisition enough munitions to replace those that have been used in Ukraine. Every one of those contracts are no bid contracts. Those are simple. One company or another picking up that particular item and manufacturing it for the military without a bid. This is unacceptable. The good news is that the Biden administration, in other sectors of the economy is saying, wait a minute. The American economic system is based on competition, so we're not going to support continued consolidation where there is a lessening of competition. They've not yet done so in the military industrial complex, although they certainly should. And as near as I can tell, the Department of Defense is part of the administration. And the Department of Defense ought to get on board and take significant steps to stop the continued consolidation of the defense industry.nn<strong>Tom Temin <\/strong>Is the Defense Department, its acquisition patterns and planning processes, could that be part of the problem? Because if there was a discernible and steady demand signal coming from DoD, then maybe more companies would be prompted to get in on it. But it's the stop and start nature of many of the programs. Says to companies, well, this is not a business for me anymore.nn<strong>John Garamendi <\/strong>That's just not the case. These programs go forever and for decades. The funding may move a little bit one way or the other, but the programs continue. Shipbuilding continues. We have 35 continues. On and on, the major programs are cemented in, and that in itself is a problem. But you've also hit on the edge of a very significant problem. It's virtually impossible for new companies to get into the game. The Beltway Bandits control it. They have a relationship with the Department of Defense, and the Department of Defense does what is the easiest. They go and work with people that they already know, often know that have gone through the revolving door. And so we wind up with this cabal between the Department of Defense and the military companies industrial complex. It's a cozy relationship, and the billions of billions continue to flow. Small companies can't get in the door.nn<strong>Tom Temin <\/strong>Yes, because there has been a series of so-called innovation programs, increased use of other transaction authorities and all of these measures to try to get what they say they want, which is innovative small businesses in drones and autonomy and all of these new initiatives. And yet a tiny fraction of the spending actually goes to those companies. That's one of the factors you're looking at.nn<strong>John Garamendi <\/strong>Oh, absolutely. And there's a major effort within the Department of Defense now to push this entire effort to bring new companies into the contracting for the military. Hopefully will be more successful than the past. And by my most recent count, there are five different organizations within the Department of Defense to do this, but it is frankly not working, in part because it's easier to do what you did yesterday. And there is a risk to step outside the norm, and there's a risk to bring in a new company. For example, the manufacturing of certain armaments is now being done by the major defense contractors who have did it before, and the government is spending millions upon millions to expand the capacity of those companies. Could those millions of millions be used to expand the capacity of new contractors? Of course they could. But that's a risk. That's a risk to the people that are within the Department of Defense, the acquisition teams. That they may wind up unsuccessful. The power of the big companies is such that, yeah, they're going to screw up and they certainly have done that multiple times. But they're big. And in that bigness there's protection not only for the company, but also for those who do the contracting within the Department of Defense.nn<strong>Tom Temin <\/strong>We're speaking with California Democrat John Garamendi. He's ranking member of the House Armed Services Subcommittee on Readiness. And your recent letter to get back to that, called on the DoD to do more scrutiny or oversight of mergers and acquisitions. Does it have any authority to do anything about it if they don't like one, that's happening anyway?nn<strong>John Garamendi <\/strong>Of course they do. They don't. The problem is they don't act. The most recent mergers, they could have spoken up about the effect that is the lack of competition, the consolidation of some critical parts of the supply chain for the materials that the department or the military needs are now in the hands of one company. The way they should have done it is to work with the other federal agencies, Federal Trade Commission, specifically with the White House. The White House and the Federal Trade Commission have a very clear policy of scrutinizing and often opposing mergers. This is done in the commercial sector, not in the military sector. The Department of Defense knows or should know that the consult obligation is eliminating competition, and in some cases, even eliminating the ability to produce or manufacture certain goods, leaving it to just one company. And that company may decide that the profit on that particular line of work is insufficient and will simply ignore it. Now, that's not just my dreaming that's actually happening.nn<strong>Tom Temin <\/strong>Let me ask you about another related gambit that the DoD has been talking about, and that is building up what it calls the organic industrial base. There are certain things munitions, for example, they have plants that do make the howitzer shells and so on. Is that a way to foster competition or is that a way to, do you think, is it removing the impetus for competition?nn<strong>John Garamendi <\/strong>Actually it's both. Clearly, over the last two decades, we've allowed the organic base from ship repair to munitions and the like to simply atrophy. And that's is now creating a major problem for the military. We've seen the drawdown of our materials, our depots and supplies as we've provide the weapons that Ukraine needs. The result of all of this is that the ability of the system to produce the necessary munitions and other items is insufficient. Now, what's happening here is the federal government is pumping a vast amount of money into that organic base. All parts of from the repair depots to the manufacturing of munitions, as well as shipyards and the like. We have to do that. Now, the bottom line is the military doesn't run those places. In almost every case, those facilities are contracted out to, once again, the military industrial complex to do the work at that particular facility. That's not universal, but that is the general way in which this has worked. So once again, we're back to a handful of companies that contend for those contracts. There's another piece of this related but not so direct. And that is the Army Corps of Engineers, who is responsible, has the programs to build everything from dams and levees to facilities, depots, airbases and the like. Once again, Army Corps of Engineers finds it more convenient to go to the good old boys that they've dealt with for decades and do a contract, a prime contract with that organization. Now, there are excellent contractors around the country and around the world, American contractors that could easily do that work. They do it on the civilian side, but the Corps of Engineers finds it more convenient, easier and less risky to hire, again, the Beltway bandits. And the Beltway bandits bring into various parts of the country, not local contractors, but their crews from wherever it may be around the world, leaving the local contractors out and leaving the opportunity for those communities to enjoy the benefits of these multimillion dollar construction projects.nn<strong>Tom Temin <\/strong>And you have raised this issue at this particular time. And here it is, March. And, golly, in a few months, you're going to have to have a National Defense Authorization Act, once again,\u00a0 before the end of the year, in theory. Will you put something in the NDAA for 2025 that addresses this particular issue, especially in light of this new report that just came out? Defense resourcing for the future, the PPBE McNamara era process, which is still extant in DoD. Kind of relates to all of this also.nn<strong>John Garamendi <\/strong>Absolutely. Senator Warren and I are determined to make this an issue. We believe in competition, the American system of economic competition. And we want to see that competition in full bloom in the Department of Defense and in the billions, well, it's $1 trillion of taxpayer money that flows through the Department of Defense and all of its iterations. So, yes, we're going to stay with that. Also, it needs to be understood that the major contractors, Boeing, specifically refuse to provide the necessary cost information on their program. So simply tell the Department of Defense, go away. We're not going to give you the information that is required by law to be given to the Department of Defense about the cost factors, in the major contracts that they have. That is absolutely unacceptable. And just as a matter of course, we need auditors, in the Department of Defense that have the guts to have the capability and the resources, to order these multibillion dollar contracts to make sure that the American government and taxpayers are not being taken down the road.nn<strong>Tom Temin <\/strong>And just a final question on the DIB issue. You mentioned shipbuilding, of which there is virtually no competition. In fact, for some, I think Coast Guard cutters, they had to go to a European company because there was no capability in the United States. But if you look at something like destroyers, carriers, submarines. What evidence is there at this point in time that there is the capacity in the United States for a competitor to these types of platform manufacturers to even exist, given the capital requirements and the talent requirements? Could we even have a second shipbuilder?nn<strong>John Garamendi <\/strong>It's entirely possible, if it was the Department of Defense's strategy to do so. Right now, the Department of the taxpayers are pumping billions of dollars into improving the shipyards, both the public and the private shipyards. There is a strategy. I've been working on this now for nearly a decade. The strategy is to rebuild our maritime industry. The Jones Act, for example, and it's possible for the military to create a program like the Craft Program, which makes domestic commercial airliners available to the military when needed. And every year, taxpayers who Department of Defense are subsidizing the commercial airlines so that we could have those airplanes available when needed. And we do call upon from time to time. We could do the exact same thing with the maritime industry. Multiple ways we can rebuild our domestic shipbuilding. For example, the United States is a huge exporter of natural gas and a petroleum. If 10 to 15% of that was on American built ships, we would build 30 to 40 commercial ships in the next ten years, thereby building the capacity for the military to have multiple shipbuilders available. Is it possible to do that? Yeah, there ought to be a law. I've been proposing that now for seven years that we call it energizing the American shipbuilding industry by simply requiring, as we once did, that those exports of petroleum products beyond American ships used to be 100%. Now it's zero. And Chinese ships are being built to carry American, natural gas, LNG and petroleum products. No, wrong. We should do it ourselves. I know the petroleum industry is going to whine. Oh, it's going to cost an extra $0.05 a barrel to do it. Well screw them. This is about the United States having a capacity to build the ships that we need to protect ourselves. Right now, we cannot do it.<\/blockquote>"}};

The defense industrial base roster of companies keeps shrinking, and supply chain snags have become constant. Now at least some members of Congress have asked whether the Defense Department should step in more often when DIB companies merger or acquire one other. The Federal Drive with Tom Temin gets more now from Democratic Congressman, John Garamendi, ranking member of the House Armed Services Subcommittee on Readiness.

Interview Transcript: 

Tom Temin Your letter to Secretary Austin was widely reported. What do you feel DoD should do with respect to mergers and acquisitions, which occur, I think, more often than people may realize.

John Garamendi Well, let’s start with competition is absolutely critical in every part of the American economy. Unfortunately, what we’re finding in the defense industry is that competition is all but disappeared. The companies do not compete with each other. The five majors don’t. They basically wind up with no bid, no competitive contracts for multibillion dollar programs. For example, the Sentinel program. I was a no bid, no competition, $130 billion contract. This is absolutely unacceptable. And that’s not the only one. We can go to numerous programs. The acquisition enough munitions to replace those that have been used in Ukraine. Every one of those contracts are no bid contracts. Those are simple. One company or another picking up that particular item and manufacturing it for the military without a bid. This is unacceptable. The good news is that the Biden administration, in other sectors of the economy is saying, wait a minute. The American economic system is based on competition, so we’re not going to support continued consolidation where there is a lessening of competition. They’ve not yet done so in the military industrial complex, although they certainly should. And as near as I can tell, the Department of Defense is part of the administration. And the Department of Defense ought to get on board and take significant steps to stop the continued consolidation of the defense industry.

Tom Temin Is the Defense Department, its acquisition patterns and planning processes, could that be part of the problem? Because if there was a discernible and steady demand signal coming from DoD, then maybe more companies would be prompted to get in on it. But it’s the stop and start nature of many of the programs. Says to companies, well, this is not a business for me anymore.

John Garamendi That’s just not the case. These programs go forever and for decades. The funding may move a little bit one way or the other, but the programs continue. Shipbuilding continues. We have 35 continues. On and on, the major programs are cemented in, and that in itself is a problem. But you’ve also hit on the edge of a very significant problem. It’s virtually impossible for new companies to get into the game. The Beltway Bandits control it. They have a relationship with the Department of Defense, and the Department of Defense does what is the easiest. They go and work with people that they already know, often know that have gone through the revolving door. And so we wind up with this cabal between the Department of Defense and the military companies industrial complex. It’s a cozy relationship, and the billions of billions continue to flow. Small companies can’t get in the door.

Tom Temin Yes, because there has been a series of so-called innovation programs, increased use of other transaction authorities and all of these measures to try to get what they say they want, which is innovative small businesses in drones and autonomy and all of these new initiatives. And yet a tiny fraction of the spending actually goes to those companies. That’s one of the factors you’re looking at.

John Garamendi Oh, absolutely. And there’s a major effort within the Department of Defense now to push this entire effort to bring new companies into the contracting for the military. Hopefully will be more successful than the past. And by my most recent count, there are five different organizations within the Department of Defense to do this, but it is frankly not working, in part because it’s easier to do what you did yesterday. And there is a risk to step outside the norm, and there’s a risk to bring in a new company. For example, the manufacturing of certain armaments is now being done by the major defense contractors who have did it before, and the government is spending millions upon millions to expand the capacity of those companies. Could those millions of millions be used to expand the capacity of new contractors? Of course they could. But that’s a risk. That’s a risk to the people that are within the Department of Defense, the acquisition teams. That they may wind up unsuccessful. The power of the big companies is such that, yeah, they’re going to screw up and they certainly have done that multiple times. But they’re big. And in that bigness there’s protection not only for the company, but also for those who do the contracting within the Department of Defense.

Tom Temin We’re speaking with California Democrat John Garamendi. He’s ranking member of the House Armed Services Subcommittee on Readiness. And your recent letter to get back to that, called on the DoD to do more scrutiny or oversight of mergers and acquisitions. Does it have any authority to do anything about it if they don’t like one, that’s happening anyway?

John Garamendi Of course they do. They don’t. The problem is they don’t act. The most recent mergers, they could have spoken up about the effect that is the lack of competition, the consolidation of some critical parts of the supply chain for the materials that the department or the military needs are now in the hands of one company. The way they should have done it is to work with the other federal agencies, Federal Trade Commission, specifically with the White House. The White House and the Federal Trade Commission have a very clear policy of scrutinizing and often opposing mergers. This is done in the commercial sector, not in the military sector. The Department of Defense knows or should know that the consult obligation is eliminating competition, and in some cases, even eliminating the ability to produce or manufacture certain goods, leaving it to just one company. And that company may decide that the profit on that particular line of work is insufficient and will simply ignore it. Now, that’s not just my dreaming that’s actually happening.

Tom Temin Let me ask you about another related gambit that the DoD has been talking about, and that is building up what it calls the organic industrial base. There are certain things munitions, for example, they have plants that do make the howitzer shells and so on. Is that a way to foster competition or is that a way to, do you think, is it removing the impetus for competition?

John Garamendi Actually it’s both. Clearly, over the last two decades, we’ve allowed the organic base from ship repair to munitions and the like to simply atrophy. And that’s is now creating a major problem for the military. We’ve seen the drawdown of our materials, our depots and supplies as we’ve provide the weapons that Ukraine needs. The result of all of this is that the ability of the system to produce the necessary munitions and other items is insufficient. Now, what’s happening here is the federal government is pumping a vast amount of money into that organic base. All parts of from the repair depots to the manufacturing of munitions, as well as shipyards and the like. We have to do that. Now, the bottom line is the military doesn’t run those places. In almost every case, those facilities are contracted out to, once again, the military industrial complex to do the work at that particular facility. That’s not universal, but that is the general way in which this has worked. So once again, we’re back to a handful of companies that contend for those contracts. There’s another piece of this related but not so direct. And that is the Army Corps of Engineers, who is responsible, has the programs to build everything from dams and levees to facilities, depots, airbases and the like. Once again, Army Corps of Engineers finds it more convenient to go to the good old boys that they’ve dealt with for decades and do a contract, a prime contract with that organization. Now, there are excellent contractors around the country and around the world, American contractors that could easily do that work. They do it on the civilian side, but the Corps of Engineers finds it more convenient, easier and less risky to hire, again, the Beltway bandits. And the Beltway bandits bring into various parts of the country, not local contractors, but their crews from wherever it may be around the world, leaving the local contractors out and leaving the opportunity for those communities to enjoy the benefits of these multimillion dollar construction projects.

Tom Temin And you have raised this issue at this particular time. And here it is, March. And, golly, in a few months, you’re going to have to have a National Defense Authorization Act, once again,  before the end of the year, in theory. Will you put something in the NDAA for 2025 that addresses this particular issue, especially in light of this new report that just came out? Defense resourcing for the future, the PPBE McNamara era process, which is still extant in DoD. Kind of relates to all of this also.

John Garamendi Absolutely. Senator Warren and I are determined to make this an issue. We believe in competition, the American system of economic competition. And we want to see that competition in full bloom in the Department of Defense and in the billions, well, it’s $1 trillion of taxpayer money that flows through the Department of Defense and all of its iterations. So, yes, we’re going to stay with that. Also, it needs to be understood that the major contractors, Boeing, specifically refuse to provide the necessary cost information on their program. So simply tell the Department of Defense, go away. We’re not going to give you the information that is required by law to be given to the Department of Defense about the cost factors, in the major contracts that they have. That is absolutely unacceptable. And just as a matter of course, we need auditors, in the Department of Defense that have the guts to have the capability and the resources, to order these multibillion dollar contracts to make sure that the American government and taxpayers are not being taken down the road.

Tom Temin And just a final question on the DIB issue. You mentioned shipbuilding, of which there is virtually no competition. In fact, for some, I think Coast Guard cutters, they had to go to a European company because there was no capability in the United States. But if you look at something like destroyers, carriers, submarines. What evidence is there at this point in time that there is the capacity in the United States for a competitor to these types of platform manufacturers to even exist, given the capital requirements and the talent requirements? Could we even have a second shipbuilder?

John Garamendi It’s entirely possible, if it was the Department of Defense’s strategy to do so. Right now, the Department of the taxpayers are pumping billions of dollars into improving the shipyards, both the public and the private shipyards. There is a strategy. I’ve been working on this now for nearly a decade. The strategy is to rebuild our maritime industry. The Jones Act, for example, and it’s possible for the military to create a program like the Craft Program, which makes domestic commercial airliners available to the military when needed. And every year, taxpayers who Department of Defense are subsidizing the commercial airlines so that we could have those airplanes available when needed. And we do call upon from time to time. We could do the exact same thing with the maritime industry. Multiple ways we can rebuild our domestic shipbuilding. For example, the United States is a huge exporter of natural gas and a petroleum. If 10 to 15% of that was on American built ships, we would build 30 to 40 commercial ships in the next ten years, thereby building the capacity for the military to have multiple shipbuilders available. Is it possible to do that? Yeah, there ought to be a law. I’ve been proposing that now for seven years that we call it energizing the American shipbuilding industry by simply requiring, as we once did, that those exports of petroleum products beyond American ships used to be 100%. Now it’s zero. And Chinese ships are being built to carry American, natural gas, LNG and petroleum products. No, wrong. We should do it ourselves. I know the petroleum industry is going to whine. Oh, it’s going to cost an extra $0.05 a barrel to do it. Well screw them. This is about the United States having a capacity to build the ships that we need to protect ourselves. Right now, we cannot do it.

The post Should the Defense Department get more mixed up with mergers and acquisitions? first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/acquisition/2024/03/should-the-defense-department-get-more-mixed-up-with-mergers-and-acquisitions/feed/ 0
GSA CIO, IG spar over purchase of China-made video conferencing cameras https://federalnewsnetwork.com/cybersecurity/2024/03/gsa-cio-ig-spar-over-purchase-of-china-made-video-conferencing-cameras/ https://federalnewsnetwork.com/cybersecurity/2024/03/gsa-cio-ig-spar-over-purchase-of-china-made-video-conferencing-cameras/#respond Fri, 01 Mar 2024 23:01:28 +0000 https://federalnewsnetwork.com/?p=4909641 Lawmakers took GSA to task for purchasing 150 China-made video conferencing cameras in 2022, calling it "a very troubling episode."

The post GSA CIO, IG spar over purchase of China-made video conferencing cameras first appeared on Federal News Network.

]]>
var config_4911768 = {"options":{"theme":"hbidc_default"},"extensions":{"Playlist":[]},"episode":{"media":{"mp3":"https:\/\/www.podtrac.com\/pts\/redirect.mp3\/traffic.megaphone.fm\/HUBB9817059675.mp3?updated=1709556772"},"coverUrl":"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2023\/12\/3000x3000_Federal-Drive-GEHA-150x150.jpg","title":"GSA CIO, IG spar over purchase of China-made video conferencing cameras","description":"[hbidcpodcast podcastid='4911768']nnThe General Services Administration\u2019s top IT official says GSA did not violate the law when it bought more than 100 China-made video conferencing cameras in 2022 as part of a pilot project.nnGSA Chief Information Officer David Shive also says nobody at the agency intentionally misled the contracting officer into approving the purchases.nnGSA\u2019s deputy inspector general, however, says officials in the agency\u2019s Office of Digital Infrastructure Technologies (IDT) supplied the contracting officer with \u201cegregiously flawed information\u201d to approve the purchase. Deputy IG Robert Erickson Jr. also maintains that the purchase violated the Trade Agreements Act of 1979.nnThe issue, <a href="https:\/\/federalnewsnetwork.com\/podcast\/federal-newscast-podcast\/congresswoman-blasts-gsa-for-making-chinese-tech-purchases\/" target="_blank" rel="noopener">simmering<\/a> since the IG issued <a href="https:\/\/www.gsaig.gov\/content\/gsa-purchased-chinese-manufactured-videoconference-cameras-and-justified-it-using" target="_blank" rel="noopener">its report<\/a> on the purchases in January, came to a head during a hearing on Thursday before the House Oversight and Accountability subcommittee on cybersecurity, information technology and government innovation committee.nn\u201cAs stewards of federal IT procurement government wide, GSA especially must show preeminent expertise and diligence in buying the right it to ensure government works and is secured,\u201d Ranking Member Gerry Connolly (D-Va.) said. \u201cWhile GSA has made the case they've not violated any laws, the American people deserve to know why they piloted products that would not have complied with the Trade Agreements Act if they were bought at the amount necessary to serve the full organization.\u201dnnThe IG\u2019s report centers on two separate transactions occurring in March and October of 2022, respectively. GSA purchased a total of 150 video conference cameras from Owl Labs, which manufactured their video conferencing cameras in China until mid-2023.nnShive said GSA\u2019s decision to pilot the Owl Labs cameras was based on their \u201cunique capability of a 360-degree view and portability.\u201dnn\u201cIt also required no installation, was compact and easy to relocate and store and was one of the least expensive among the options,\u201d Shive said.nnThe IG report found that \u201cat least\u201d one alternative existed that was manufactured in a TAA-compliant country. But \u201cthe market research provided to the contracting officer did not include information on this alternative," the report states.nnShive maintained that the Owl Labs cameras were the only devices that met GSA\u2019s requirements. He conceded that GSA could have done a better job documenting its requirements.nn\u201cWe did a fulsome analysis of the market research, interviewed the people involved, and determined that nobody intentionally misled the contracting officer,\u201d Shive said. \u201cWe said, \u2018Okay, this is a training opportunity.\u2019 So we've trained not only this person, but corresponding staff in two ways. One, we've given them training on [Buy American Act] and TAA compliance. And the other is we've trained them on what proper market research would look like, specifically documentation.\u201dnnHe also said GSA has taken steps to ensure that the cameras operated securely.nn\u201cIn line with our security protocols, GSA voluntarily removed older Owls from use that the vendor indicated would no longer be supported,\u201d Shive said. \u201cFor the remaining devices, our security assessment determined that the cyber security risks were low. GSA chose to intentionally configure them for use in a more limited manner in order to further reduce any potential vulnerabilities.\u201dnnA spokesperson for Owl Labs said the company's "core products" are now made in Vietnam.nn"Prior to mid-2023, Owl Labs worked with a leading, multinational contract manufacturer in China, as many large U.S. companies do," the spokesperson said. "No security breaches have ever occurred or been reported among customers using Owl Labs products. Owl Labs devices never record, collect, transmit or store any video or audio data from any meetings. We regularly conduct penetration testing of our software and hardware to ensure they meet industry security standards."n<h2>GSA, IG disagree over TAA compliance<\/h2>nShive further argued the purchases did not violate the TAA since even taken together the procurement didn\u2019t meet the threshold of $183,000 required to invoke TAA compliance. He also said GSA has no intention to purchase any more Owl Labs cameras.nnBut Erickson Jr. pushed back on that response, arguing the pilot program was meant to lead to a larger procurement.nn\u201cThis was going to be a bigger purchase,\u201d he said. \u201cIt was going to be scaled up to purchase a lot of Chinese video cameras.\u201dnnConnolly also took a dim view of Shive\u2019s statement.nn\u201cYou've already got GSA employees saying there was no other product,\u201d Connolly said. \u201cSo that would argue no, once we have the pilot, we're going to scale up with this product. There seemed to be no sensitivity or care that it was Chinese and that there was security concerns inherent in a Chinese camera, because we have experienced that with other Chinese technologies. Red lights had to go on. And it was in violation, frankly, of U.S. government policy. And that's strange, given the fact that you're the General Service Administration charged with this very mission for on behalf of the federal government.\u201dnn\u201cIt's a very troubling episode,\u201d Connolly added.nnSubcommittee Chairwoman Nancy Mace (R-S.C.) illustrated <a href="https:\/\/federalnewsnetwork.com\/technology-main\/2022\/12\/inside-the-fcc-decision-to-ban-sales-of-chinese-made-telecom-gear\/" target="_blank" rel="noopener">broader concerns<\/a> about buying technology manufactured in China.nn\u201cTo think that buying Chinese equipment that could be used to spy on us and our government is a good idea, is a terrible idea, and I hope that you never do it again,\u201d Mace said to Shive during her closing remarks. \u201cAnd I hope you get rid of what you have and give it to somebody else. Maybe give it to Russia, because I don't want that stuff in our federal government or in our agencies.\u201d"}};

The General Services Administration’s top IT official says GSA did not violate the law when it bought more than 100 China-made video conferencing cameras in 2022 as part of a pilot project.

GSA Chief Information Officer David Shive also says nobody at the agency intentionally misled the contracting officer into approving the purchases.

GSA’s deputy inspector general, however, says officials in the agency’s Office of Digital Infrastructure Technologies (IDT) supplied the contracting officer with “egregiously flawed information” to approve the purchase. Deputy IG Robert Erickson Jr. also maintains that the purchase violated the Trade Agreements Act of 1979.

The issue, simmering since the IG issued its report on the purchases in January, came to a head during a hearing on Thursday before the House Oversight and Accountability subcommittee on cybersecurity, information technology and government innovation committee.

“As stewards of federal IT procurement government wide, GSA especially must show preeminent expertise and diligence in buying the right it to ensure government works and is secured,” Ranking Member Gerry Connolly (D-Va.) said. “While GSA has made the case they’ve not violated any laws, the American people deserve to know why they piloted products that would not have complied with the Trade Agreements Act if they were bought at the amount necessary to serve the full organization.”

The IG’s report centers on two separate transactions occurring in March and October of 2022, respectively. GSA purchased a total of 150 video conference cameras from Owl Labs, which manufactured their video conferencing cameras in China until mid-2023.

Shive said GSA’s decision to pilot the Owl Labs cameras was based on their “unique capability of a 360-degree view and portability.”

“It also required no installation, was compact and easy to relocate and store and was one of the least expensive among the options,” Shive said.

The IG report found that “at least” one alternative existed that was manufactured in a TAA-compliant country. But “the market research provided to the contracting officer did not include information on this alternative,” the report states.

Shive maintained that the Owl Labs cameras were the only devices that met GSA’s requirements. He conceded that GSA could have done a better job documenting its requirements.

“We did a fulsome analysis of the market research, interviewed the people involved, and determined that nobody intentionally misled the contracting officer,” Shive said. “We said, ‘Okay, this is a training opportunity.’ So we’ve trained not only this person, but corresponding staff in two ways. One, we’ve given them training on [Buy American Act] and TAA compliance. And the other is we’ve trained them on what proper market research would look like, specifically documentation.”

He also said GSA has taken steps to ensure that the cameras operated securely.

“In line with our security protocols, GSA voluntarily removed older Owls from use that the vendor indicated would no longer be supported,” Shive said. “For the remaining devices, our security assessment determined that the cyber security risks were low. GSA chose to intentionally configure them for use in a more limited manner in order to further reduce any potential vulnerabilities.”

A spokesperson for Owl Labs said the company’s “core products” are now made in Vietnam.

“Prior to mid-2023, Owl Labs worked with a leading, multinational contract manufacturer in China, as many large U.S. companies do,” the spokesperson said. “No security breaches have ever occurred or been reported among customers using Owl Labs products. Owl Labs devices never record, collect, transmit or store any video or audio data from any meetings. We regularly conduct penetration testing of our software and hardware to ensure they meet industry security standards.”

GSA, IG disagree over TAA compliance

Shive further argued the purchases did not violate the TAA since even taken together the procurement didn’t meet the threshold of $183,000 required to invoke TAA compliance. He also said GSA has no intention to purchase any more Owl Labs cameras.

But Erickson Jr. pushed back on that response, arguing the pilot program was meant to lead to a larger procurement.

“This was going to be a bigger purchase,” he said. “It was going to be scaled up to purchase a lot of Chinese video cameras.”

Connolly also took a dim view of Shive’s statement.

“You’ve already got GSA employees saying there was no other product,” Connolly said. “So that would argue no, once we have the pilot, we’re going to scale up with this product. There seemed to be no sensitivity or care that it was Chinese and that there was security concerns inherent in a Chinese camera, because we have experienced that with other Chinese technologies. Red lights had to go on. And it was in violation, frankly, of U.S. government policy. And that’s strange, given the fact that you’re the General Service Administration charged with this very mission for on behalf of the federal government.”

“It’s a very troubling episode,” Connolly added.

Subcommittee Chairwoman Nancy Mace (R-S.C.) illustrated broader concerns about buying technology manufactured in China.

“To think that buying Chinese equipment that could be used to spy on us and our government is a good idea, is a terrible idea, and I hope that you never do it again,” Mace said to Shive during her closing remarks. “And I hope you get rid of what you have and give it to somebody else. Maybe give it to Russia, because I don’t want that stuff in our federal government or in our agencies.”

The post GSA CIO, IG spar over purchase of China-made video conferencing cameras first appeared on Federal News Network.

]]>
https://federalnewsnetwork.com/cybersecurity/2024/03/gsa-cio-ig-spar-over-purchase-of-china-made-video-conferencing-cameras/feed/ 0