Army advised to improve strategy for transfer of logistics work

The Army has failed to adequately plan for the transfer of billions of dollars of logistics work in the Middle East from a single company to an arrangement where that contractor vies with two others for jobs, according to a new report from the Defense Department inspector general.

Planning for a piece of the transfer that should have been relatively straightforward failed to provide sufficient safeguards to prevent delays and cost overruns, the IG found. That piece involved moving three task orders in Kuwait worth $347 million from the LOGCAP III contract, which KBR Inc. held exclusively, to a setup where KBR, Fluor Corp. and DynCorp International will compete for work.

Army officials determined that because of the comparatively stable nature of the country, Kuwait would be the easiest -- and therefore the first -- location to begin transferring the work.

"It is essential that the coordination and procedures improve so that the most critical transfer of work, planned for Iraq and Afghanistan, can be accomplished with minimal effect on the mission and warfighters in those countries," the IG stated.

In total, the service will transfer 11 task orders worth $5 billion to the LOGCAP IV contract, an indefinite-quantity indefinite-delivery agreement worth as much as $150 billion. The three firms also will compete for billions of dollars in new agreements to deliver fuel; water and food; and postal, laundry and sanitation services to troops.

Officials overseeing the contract provided auditors with multiple versions of transition plans or failed to specify a plan at all, the report said. Many of the plans, the IG said, were not signed or dated.

On Feb. 23, LOGCAP leaders issued a new comprehensive transition plan that represented a major improvement, according to the IG. But deficiencies remained, the report said. For example, transition procedures were not finalized before the transfer of work began. Specifically, the plan did not outline the roles and responsibilities of a fourth contractor -- Serco Inc. of Vienna, Va. -- hired to help with planning and to provide independent cost estimates.

In March, program officials still lacked sufficient plans for the transfer of at least 1.1 million line items worth $4 billion in LOGCAP property, the report said. The Defense Contract Management Agency was responsible for developing a strategy for property transfers and for determining when the incoming LOGCAP IV contractors were ready to begin the new work. But, the program office never verified that DCMA officials developed the required procedures, auditors said.

DCMA's property plan also lacked detailed procedures for removing hazardous materials and instructions on when to transfer contractor warehouse operations, auditors said.

Additionally, the IG criticized LOGCAP officials for failure to identify which goods and services under the Kuwait task order contracts could be purchased using firm fixed-price task orders and for not developing a standard performance work statement. And DCMA failed to carefully evaluate the work of LOGCAP contractors and document incorrect performance reviews, putting the government at risk of paying erroneous award fees, the IG said.

LOGCAP and DCMA officials disagreed with many of the report's findings.

"The report is not reflective of what transpired on the ground and during the transition of functions from the Kuwait LOGCAP III task orders to the newly competed and awarded LOGCAP IV task orders," wrote Lee Thompson, executive director of the LOGCAP program.

Still, the program office took corrective actions that address many of the concerns.

LOGCAP officials said they plan to complete a standard performance work statement before transferring task orders for Iraq and Afghanistan, for instance, and will use fixed-price contracts when feasible.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.