Report details homeland security contracting opportunities

Only nine of the 12,500 companies that proposed homeland security technologies for the Defense Department after the Sept. 11, 2001, terrorist attacks received funding, demonstrating just how risky investments in that market may be, according to one investment firm.

To help venture capitalists and corporations determine how to better target their dollars in the market, the Washington, D.C.-based homeland security investment firm O'Gara Company on Wednesday unveiled a guide for determining where federal dollars will be spent and where the likely growth areas in the sector are.

"We wanted to understand what was driving this market, and so we created a roadmap to understand what the opportunities may be," said Tom O'Gara, founder and chairman of the firm.

While the Homeland Security Department has a fiscal 2003 budget of $28.2 billion and that is projected to rise to $36.2 billion in fiscal 2004, O'Gara Company has estimated that the actual market for federal security contracts is only $6.13 billion in fiscal 2003 and $7.21 billion in fiscal 2004.

Most of the remaining money is being spent on personnel and other costs of operating the department and hence is not available to private contractors, according to the report.

The report identifies the areas most likely to provide the highest investment returns for corporations and venture capitalists as cargo-screening technology, equipment for "first responders" to emergencies, multi-model cargo security for tracking and authentication, aviation screening technology and physical security upgrades.

The areas least likely to provide high returns involve integration of the Homeland Security Department and in the intelligence community, law enforcement intelligence training, identification systems for national and population segments, and state and local intelligence sharing, the report said.

O'Gara also warned companies that Homeland Security is trying to make decisions about the best technologies even though it has existed only five months, and hence in the short term officials are likely seeking off-the-shelf technology solutions with proven markets, not new technologies.

O'Gara noted that many technology companies have come to Washington offering security technologies but so far have been frustrated with the Bush administration's follow-up to requests for ideas. He described the Homeland Security officials charged with private-sector outreach-Homeland Security Undersecretary of Science and Technology Charles McQueary and Al Martinez-Fonts, special assistant to the secretary in the Office of the Private Sector-as currently being public-relations specialists without any real power to help companies get contracts.

Despite that difficulty, the report said some companies are making money in the market. To demonstrate, it identified 30 "pure play" security companies-such as CACI, Entrust, Intergraph and Symantec-that have seen an increase in their market share since Sept. 11.

As to frustrations that money has yet to begin flowing to the private sector, O'Gara said, "Politically, I think homeland security money will be flowing by the summer of 2004," before the presidential election. "Homeland security money is like God and country."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.