Agencies still buying iPods, yo-yos, coins and other swag

Mike Flippo/

This story has been updated.

Nine agency offices may have violated a presidential order by continuing to purchase promotional items such as coins, clothing and plaques, according to an investigation by the right-leaning nonprofit government accountability group Cause of Action.

Using Freedom of Information Act requests and other public documents, the report released Tuesday concluded that President Obama’s November 2011 executive order cracking down on spending on so-called swag -- a part of the administration’s Campaign to Cut Waste -- is being ignored. It documents $1.1 million spent on items such as yo-yos, water bottles, iPods, mobile devices, trophies and other awards.

Examples include:

  • The Agriculture Department Rural Development Office in Kansas spent $38,870 on Global Positioning Systems, Nook 3G digital readers, Apple iPods and Nikon Coolpix cameras for staff;
  • The Justice Department’s Office of Community-Oriented Policing Services program paid more than $12,000 for commemorative items for a single conference;
  • The Homeland Security Department’s Office of the Inspector General bought nearly $700,000 worth of awards in fiscal 2010;
  • The Interior Department’s Fish and Wildlife Service spent more than $86,000 on commemorative items from 2009 to 2012.

“A cavalier attitude toward the efficient use of tax dollars permeates the executive branch,” Dan Epstein, executive director of Cause of Action, said in a statement. “While some agencies track their spending, revealing patterns of waste, others don’t even bother to document it. The Department of Defense, with one of the largest budgets, informed Cause of Action that it has no means of tracking promotional spending, rendering accountability impossible.”

The other offices mentioned include the Energy Department Office of the Inspector General and Agriculture’s Forest Service -- Alaska and Southwestern regions -- and its Food and Safety Service. Some of the expenses were incurred before the Obama executive order.

“Cause of Action also determined that in some instances agencies were exercising fiscal responsibility by purchasing items from more economical vendors or choosing products that were cost-effective,” the report said. “However, spending swings from responsible to excessive without reason. Overall, a pattern emerges from the data that demonstrates a spending problem in multiple agencies, including failures to track and document spending on promotional items, making accountability impossible.”

Asked to respond, OMB spokeswoman Moira Mack, said, “As part of the president's Campaign to Cut Waste, the administration is aggressively tackling unnecessary spending to ensure we are serving America's families as efficiently as possible. As a result of the president’s directive on inefficient spending, we have already cut $4 billion in costs and are on track to achieve $8 billion in reductions by slashing spending in administrative areas such as travel, fleet, printing and promotional items by the end of fiscal 2013.”

Cause of action sent FOIA requests to 23 agencies following the April scandal over lavish spending on commemorative coins and other nonessentials at a training conference by the Public Buildings Service of the General Services Administration. The group analyzed results from 32 offices.

(Image via Mike Flippo/

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.