Doubts remain over management of Coast Guard fleet upgrade

Members of the House panel overseeing the Coast Guard universally praised the commandant, Adm. Thad Allen, Tuesday for his moves to take control of the troubled Deepwater acquisition program, but expressed concerns that the service did not have enough trained procurement specialists to successfully manage the complex $24 billion effort.

House Transportation and Infrastructure Coast Guard Subcommittee Chairman Elijah Cummings, D-Md., also questioned whether Allen's bold leadership would be enough to overcome the mistakes by the previous Coast Guard leadership and the contractors responsible for producing the Deepwater ships, aircraft and systems.

"The failures already registered in Deepwater are simply unacceptable," Cummings said.

Those views were echoed by Coast Guard Subcommittee ranking member Steven LaTourette, R-Ohio, and other panel members.

Allen described the extensive changes to the Deepwater program and the Coast Guard procurement system he has ordered since becoming commandant last year and assured the panel "we're on the leading edge of significant changes in the program and are already beginning to see real results."

But he also acknowledged the program still faced a lot of challenges.

The subcommittee's concerns were reinforced by Richard Skinner, the Homeland Security Department's inspector general, who said the "sweeping changes" Allen is making "should mitigate many of the cost, schedule and performance risks" in Deepwater. But Skinner also questioned whether the Coast Guard had enough procurement experts to replace the contractor team of Lockheed Martin Corp. and Northrop Grumman Corp. as the lead systems integrator.

And he warned that the Coast Guard's plan to deal with structural flaws in the design of the National Security Cutters, the largest ships being acquired under Deepwater, "could be cost prohibitive" and force reductions in the capabilities of the NSCs or major cuts in other required systems.

Allen told the panel that the Coast Guard has identified design changes that will correct problems in the first NSC that could shorten its expected 30-year service life. Those changes will be made to the next six NSCs as they are built and will be retrofitted into the first two, which are partly constructed, he said.

Although Coast Guard engineers had questioned Northrop Grumman's plans for the NSCs, Allen admitted the government would have to pay for the design changes.

Skinner said the Coast Guard was negotiating with Northrop Grumman to make those changes before it knew how much they would cost.

He said the first two cutters already would cost "well beyond" the estimated $775 million each, not counting the $302 million additional pay the contractor has requested because of changes in the NSC schedule.

Future changes could add hundreds of millions of dollars more, Skinner said, and could require reductions in other ships now planned.

He urged the Coast Guard to delay any commitment for future work on the NSCs until it knew the total costs.

Skinner also cited hundreds of millions of dollars spent on proposed unmanned helicopters "with little to show for it;" the nearly $100 million spent to convert eight 110-foot patrol boats that had to be scrapped, and apparent flaws in expensive electronic systems obtained through Deepwater.

Allen said the Coast Guard will demand that the contractors repay the cost of converting the defunct 110-footers, and Cummings said he wanted to ensure that the taxpayers get back "every dime, every penny."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.