NNSA Defends Contract Extensions but Congressional Scrutiny Expected

The firm that manages the Los Alamos National Laboratory “received only 68 percent of its possible at-risk award fee of $46.5 million for the last budget year." The firm that manages the Los Alamos National Laboratory “received only 68 percent of its possible at-risk award fee of $46.5 million for the last budget year." Los Alamos National Laboratory

The National Nuclear Security Administration is defending itself against charges that it renewed lucrative deals for undeserving contractors, but the issue is likely to come up at congressional oversight hearings in the coming months, sources say.

The semiautonomous Energy Department agency’s Fiscal 2012 Performance Evaluation Reports, released on March 1, contain evidence that NNSA officials made exceptions that enabled the extension of contracts pertaining to at least two nuclear arms research laboratories, according to watchdog organizations.

Nuclear Watch New Mexico said last week that earning at least 80 percent of an “at-risk incentive award fee is the threshold for eligibility for a one-year contract extension” at NNSA sites. The firm that manages the Los Alamos National Laboratory in New Mexico “received only 68 percent of its possible at-risk award fee of $46.5 million for the last budget year, primarily because of cost overruns that ballooned a security project from $213 million to $254 million,” according to a press releasefrom the organization.

Nonetheless, Neile Miller, then the agency’s top award determining official and now its acting chief, overrode a decision by NNSA site personnel and granted Los Alamos National Security a waiver that extends its contract through fiscal 2018, the group said.

A similar situation occurred regarding the contract of a consortium -- consisting of Bechtel National, the University of California, Babcock and Wilcox, the Washington Division of URS and Battelle -- that manages the Lawrence Livermore National Laboratory in California, the group said.

Lawrence Livermore National Security earned 78 percent of its “available at-risk incentive fee, still short of the gateway of 80 percent,” the group said.  “However, acting NNSA Administrator Neile Miller overrode that too, giving the lab contractor an extra $541,527 to help it meet the 80 percent mark and extending the management contract another year.”

A separate release from the California-based Tri-Valley CAREs complains that the exception is noted in a “one-paragraph addendum” to the fiscal year report that “does not provide a rationale” for the waiver. The group called for “greater oversight of taxpayers’ money and a more open and transparent contract process.”

Nuclear Watch New Mexico cited the spiraling cost of the Los Alamos security system for its Technical Area 55 as one of a number of NNSA projects in which expenses have exceeded projections.

The organization said that to avoid future cost overruns, the government should emphasize conservative life-extension programs for nuclear warheads that do not involve the creation of new military capabilities.  In addition to costing more, introducing “untested changes to existing nuclear weapons” could “erode confidence in their reliability,” the group suggested.

Congress should also “pull the plug on exorbitant failed projects” such as Lawrence Livermore’s National Ignition Facility and an unfinished plant for turning nuclear-weapon plutonium into reactor fuel at the Savannah River Site in South Carolina, the group says.

Agency spokesman Josh McConaha defended Miller’s decisions and suggested that the watchdog groups might be missing the bigger picture.

“Contractors are given multiple assignments each year and each is important,” McConaha toldGlobal Security Newswire. “The ratings given the contractor must reflect all of the results for all of these activities and cannot be based on just one. Doing so would be short-sighted and leave out not just a lot of context, but a lot of important work.”

A congressional staffer who follows the issue said, though, the concerns raised by the watchdog groups are “valid.” The aide, who spoke on condition of anonymity due to not being authorized to discuss the issue publicly, said lawmakers will likely raise the matter during NNSA oversight hearings this year.

Congress has previously attempted to address lack of transparency and other issues between assessments for different NNSA sites.

The fiscal 2013 National Defense Authorization Act contains language requiring the NNSA administrator to “take appropriate actions to make available to the public, to the maximum extent practicable, contractor performance evaluations conducted by the administration of management and operating contractors of the nuclear security enterprise that results in the award of an award fee to the contractor concerned.”

According to the law, the performance evaluations should be “in a common format that facilitates comparisons of performance evaluations between and among similar management and operating contracts.”

The nonpartisan Government Accountability Office has also raised concerns about the extension of NNSA contracts for management of its facilities. Assistant Director Allison Bawden said last month that the inconsistent NNSA enforcement of contract terms could be problematic, the Nuclear Weapons Materials and Complex Monitor reported.

“What kind of message do these actions send to potential bidders on future … contracts?” Bawden said. “Will they take the contract structures as seriously?”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.