Accounting error led Defense agency to outsource jobs

A $31.8 million accounting error overlooked by auditors in the Defense Department's Office of the Inspector General resulted in the outsourcing of about 650 federal jobs and could lead to a new competition for the work.

Errors in earlier audits of an A-76 competition of the military retired and annuitant pay functions in the Defense Finance and Accounting Service (DFAS) led agency officials to award a multimillion contract to ACS Government Services Inc., according to an audit released Thursday by Defense IG Joseph Schmitz. The error caused the in-house government bid to be higher than the contractor's bid.

"The correct EPA [economic price adjustment] determination may have changed the outcome of the cost comparison decision and retained the military retired and annuitant pay functions in-house," the March 21 audit said.

About 650 positions at DFAS Cleveland and DFAS Denver were affected by the competition. These two centers processed about $2.6 billion per month in payments for 2.5 million military retirees and annuitants. The American Federation of Government Employees (AFGE) appealed the initial award decision, but on Sept. 5, 2001, ACS was awarded a contract potentially worth $346 million. The contract, which included a four-month transition period that ended in January 2002, is renewable annually for 10 years.

In August 2001, Rep. Dennis Kucinich, D-Ohio, raised concerns about errors in the competition process and auditors in the Defense IG's office agreed to investigate his claims. Three months later, the Defense IG declared that the A-76 process had not been circumvented. In response, Kucinich asked the IG to review other issues and the subsequent review again verified that the in-house bid was accurate.

Defense IG staffers in March 2002 discovered an error in the in-house bid totaling $31.8 million that earlier auditors had not detected. Subsequent investigations revealed flaws in the auditing process, and Schmitz eventually asked the General Services Administration inspector general to review the issue. GSA's IG found that the Pentagon IG's deficient auditing process increased the chances of the error being overlooked.

"As the IG put it, this is 'shoddy internal audit work. It's an oversight failure.'" Sen. Charles Grassley, R-Iowa, said Thursday when the new audit was released. "I find the IG's self-criticism so encouraging and so refreshing. In the dark ages, before Mr. Joe Schmitz became IG, this problem would have been swept under the rug. It would have never seen the light of day. I guarantee it," he said.

In response to the error, Schmitz asked DFAS officials to review the situation and to justify why there should not be a re-competition for those services. The IG also retracted the earlier audits and issued a policy memo on March 20, prohibiting IG staffers from auditing, inspecting or investigating their own work.

Grassley applauded Schmitz's candor, but called for a wholesale overhaul of the Defense IG's office.

"By exposing this audit failure in such an open and honest way, the IG is taking a giant step forward," Grassley said. "The next step is a top-to-bottom housecleaning of his audit department. With the ineffective audit capability that exists today, the IG can't be a good watchdog of the taxpayers' money."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.