Panel pushes Pentagon privatization

The Defense Department can save up to $70 billion by revamping its acquisition programs and contracting out more of its support services, according to a report released Thursday by a commission of business leaders and former government officials. The panel, known as the Tail-to-Tooth Commission, is chaired by former New Hampshire Sen. Warren Rudman and Josh Weston, retired CEO of Automatic Data Processing Inc. The "tooth" refers to combat troops and weapons systems, while the "tail" refers to infrastructure and functions that support warfighters. According to the commission, which is sponsored by a group of business leaders with an interest in national security policy, the tooth is becoming lean and mean, but the tail remains big and bureaucratic. According to the report, 70 percent of the Pentagon's budget goes to support functions, with only 30 percent paying for combat forces. The commission wants to shift Defense's budgetary focus from "tail" to "tooth." "The national interest is to make the U.S. military as efficient as we can," said Rudman. "I believe that if we apply business practices... you could get one-third of [the money] the services really need to perform their primary functions." The report identified 11 initiatives that could save the Defense Department billions of dollars. The money saved could be used to build up the armed forces and update weapons and equipment, the report said. The initiatives included expanding acquisition reform pilot programs, improving contracting processes, revising public-private competitions, closing unnecessary military bases and modernizing the defense budget and accounting system. The report also recommended that the following military operations be turned over to the private sector:
  • Military family housing
  • Long-haul Defense communications
  • Utilities on military bases
  • Supply chain management
Commission members acknowledge that their recommendations are not novel. "All 11 Tail-to-Tooth reforms have been recommended by previous panels that have reviewed Pentagon practices over the past 15 years," the commission said. The report included step-by-step instructions on how to actually implement the reforms. "This is a blueprint for action, it's not a report about what other people should do," Weston said. "We're not talking about chicken feed here. We're talking about something that could be a monumental difference to the Defense Department." Bob Welch, vice president for government operations at Acquisition Solutions Inc., says the commission's recommendations are "right on the money." Welch was the top procurement official at the Commerce Department under the Clinton administration. "It will just take management and leadership over at the Pentagon to embrace it and say we're going to do this," Welch said. "It's really hard to change the way people have been taught to do business." Rudman and Weston said the group plans to lobby for Defense privatization and downsizing in Congress, in the Pentagon and at the White House. "We're not trying to lecture people and tell them 'Here's what we think you should do and here's when you should do it,' but we think this is a good kick-start," Rudman said.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.