How Many Big Contractors Are Actually Posing As Small Businesses?

Apple is among the companies the American Small Business League said was counted as a small firm. Apple is among the companies the American Small Business League said was counted as a small firm. Andrey Bayda /

In the sixth of its annual studies, a small business advocacy group has again blasted the government for allegedly awarding contracts to major corporations when policy intends for them to go to legitimate small businesses. The Small Business Administration offered other possible explanations for the apparent discrepancies.

The Petaluma, Calif.-based American Small Business League’s new study of fiscal 2013 procurement data concluded that of the top 100 companies receiving the highest-valued small business federal contracts, “79 were large companies that exceeded the SBA’s small business size standards, five were anomalous and 16 were legitimate small businesses.”

The group’s annual studies also show that the number of top-100 contracting companies that are large firms has risen steadily, from 60 in fiscal 2009 to 84 in fiscal 2013.

The large corporations that received the contracts in question in fiscal 2013 included Lockheed Martin Corp., General Dynamics Corp., Boeing Co., General Electric, Oracle Corp., Apple Inc., Verizon, Bank of America Corp., Citigroup Inc., PepsiCo, Comcast Corp., Intel Corp., John Deere Co. and many more, said the league, which published brief company-by-company profiles.

“Once again, large companies are the fraudulent recipients of a large portion of federal small business contracts,” League President Lloyd Chapman said in a statement. “This practice is disastrous to our economy and hurting the American people. The ASBL urges leaders to enforce renewed oversight and monitoring of federal small business programs.”

Asked for a response, an SBA official declined to comment on the league’s methodology but reiterated the agency’s commitment to getting contracts to small businesses. “In some instances, a legitimate small business may appear to be ‘other than small’ in the Federal Procurement Data System,” said John Shoraka, associate administrator for government contracting and business development. “This occurs for a variety of reasons, including the growth of a business, mergers and acquisitions, or human data entry error. SBA has no tolerance for fraud, waste and abuse, and takes corrective steps when actionable information comes to light.”

Shoraka stressed that SBA over the past three years has initiated more governmentwide suspension and debarment actions against contractors than in the previous 10 years. “The fact that a contract awarded to a large business is coded in a database as an award to a small business does not mean that the contract was taken away from a small business or that small businesses suffered,” he said. “Unless a contract was set aside for a small business, the designation as a small business does not benefit that business in receiving the award.  The designation could be a result of a mistake on the part of the contracting officer, who actually enters the designation in the database, or the firm when filing its representation for that contract.”

He added that SBA has a protest process for the size representation in contracts containing small business set-asides. “SBA cannot alter the federal procurement data that has been [entered] into FPDS,” he said. “However, we are continuously taking steps to improve data integrity. Each agency is responsible for ensuring the quality of its own contracting data, but SBA conducts additional analysis to help agencies identify any potential data anomalies.  As part of its ongoing data quality efforts, SBA is continuing to work with federal agency procurement staff to provide tools to encourage data reviews, improvements to procurement systems and training sessions to improve accuracy.”

(Image via Andrey Bayda /

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.