The Letter of the Law

DHS might have funded shared services illegally by pooling earmarked funds.

The Homeland Security Department has been directed to reassess how it paid for shared services in 2006 to support the now defunct Preparedness Directorate after a Government Accountability Office review found that the directorate did not follow guidelines and might have violated the Antideficiency Act.

The department established the Preparedness Directorate in 2005 to coordinate efforts across federal, state and local agencies to prevent and respond to emergencies. The shared services transfers in question were drawn from a variety of DHS accounts and were used primarily to pay for infrastructure protection and information security programs. The exact amounts were not well-documented, but DHS reported about $60 million in shared services spending in 2006.

The appropriations process designates dollars for specific accounts for specific purposes. Agencies generally are not allowed to transfer funds among accounts, even to pay for services that cut across departments, component agencies or appropriations accounts. Agencies not given authority to pool funds for certain shared services still have some flexibility under the Economy Act or the account adjustment statute. The Economy Act allows agencies to place orders with other agencies if justified; the adjustment statute permits an agency to use funds from an account to cover the cost of a common service and then to charge all benefiting accounts for the service.

In a letter to GAO, Homeland Security said it relied on the principles of the Economy Act to allocate the cost of shared services across various appropriations under the Preparedness Directorate's control. "Care was taken to ensure that no [Programs, Projects and Activities account] augmented any other PPA," wrote Michael Russell, DHS' deputy associate general counsel.

But DHS did not properly justify, record or report pooling transactions, according to the report (B-308762), a concern especially for auditors. "People say, 'I satisfied the spirit of the statute,' but how do you know, particularly if you're an auditor?" GAO General Counsel Gary Kepplinger says. "My response is 'I can't see ghosts; I don't believe in ghosts.' " He believes the flexibility of the account adjustment statute would have made it the best option. "I think they were searching for an explanation of what they did and the Economy Act principles were what came to mind," he says.

GAO directed DHS to adjust its fiscal 2006 accounts so the value of all services received is deducted from the proper places. This essentially would be retroactive use of the account adjustment statute. If any accounts do not have enough unobligated funds, GAO instructs DHS to report an Antideficiency Act violation. The law prohibits agencies from making or authorizing expenditures in excess of the amount available.

If DHS' adjustments show an overobligation, the agency must file a violation report with the president, Congress and GAO, delineating where and why the violation occurred, the amount, who was responsible, and what steps have been taken to address the cause.

Homeland Security reorganized the Preparedness Directorate in March, moving many of its functions to the Federal Emergency Management Agency. "This directorate has modified the way they're doing things, so I'm not going to assume there is a continuing problem unless we have some indication of that," Kepplinger says.

In general, federal agencies do not seem to be struggling to fund shared services legally. According to Kepplinger, there have been very few violations reported during the last decade. "There is more than enough adequate authority out there to accomplish what they wanted to accomplish; they just need to be thoughtful in advance about what they are doing," he says.

While it will likely take DHS some time to re-examine all pooling transactions, Kepplinger is confident the agency will address the issues under the watchful eye of the DHS inspector general and the appropriations committees.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.