Homeland Security relying more on fixed-price contracts, report says

The share of Homeland Security Department contracts that fulfill the Obama administration's preference for fixed-price awards rose steadily over the past four years to reach 10.3 percent, or $7.5 billion in fiscal 2010, a new think tank study reports.

That rise followed an earlier hike in dependence on time-and-materials or cost-reimbursement contracts in the wake of natural disasters such as Hurricane Katrina in 2005, according the Center for Strategic and International Studies. Its study, "DHS Contract Spending and the Supporting Industrial Base," released Thursday, analyzed federal data from from fiscal 2004 to fiscal 2010, dealing primarily with service contracts. It incorporated input from DHS officials.

Homeland Security's move toward fixed-price awards coincided with reduced use of purchase orders and contracts awarded without competition, the report noted. David Berteau, the project's director who runs CSIS' defense-industrial initiatives group, applauded efforts by the Office of Management and Budget to "require agencies for the first time to use the Federal Procurement Data System as a management tool to track improvements and enhance competition."

The report also noted a doubling in the use of multiple-contract awards at Homeland Security and a 10.6 percent yearly decline in single-contract awards. "Multiple awards not only help create competition," Berteau said, "they help the agency decide what it is seeking in the contract's requirements." The value of contracts awarded without competition shrunk from a high of $7 billion in 2006 to $1.6 billion in 2010, the report said.

Homeland Security has been successfully adhering to Small Business Administration guidelines for awarding contracts to small firms. "Unlike the Defense Department, which has a growing share going to large companies, DHS has a broad diversity of companies, which also emphasizes competition," Berteau said.

The agency controls about half the contracts dealing with homeland security, with the Pentagon running a quarter and the remainder coming out of the Justice, State, Energy and Health and Human Services departments.

The portion of contracts run out of the Office of the Secretary at Homeland Security rose 900 percent and in 2010 accounted for the largest share of contract spending, the report noted. The bulk of this increase reflects the recent transfer of the Federal Protective Service, which supervises many private contractors, from Immigration and Customs Enforcement to Homeland Security's Office of Procurement Operations, within the secretary's office, the report said. Berteau said the growth is not necessarily a reflection of the management approach of Homeland Security leadership.

The report's list of the top 20 Homeland Security contractors indicated a flip in priorities, noted project co-director Guy Ben-Ari. "It shows the dynamic nature of DHS contracting, with less emphasis today on disaster response and more on the rise of IT and defense awards," he said.

In 2005, the top five DHS contracting companies were Circle B, Integrated Coast Guard Systems, Fairmont Homes, Unisys and Graham. In 2010, the top five in were IBM, Lockheed Martin, Integrated Coast Guard Systems, Unisys and Accenture.

Established in 2002, Homeland Security is the only national security agency whose budget was not significantly increased in the years after the Sept. 11 terrorist attacks, Berteau said. Hence Homeland Security planners must remain aware that they don't have "the same cushion for the looming drawdown" in federal spending as do other agencies.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.