Paying a VISIT

The government's most ambitious, and potentially lucrative, homeland security initiative got a major boost Friday, as the Homeland Security Department released a request for proposals to build a massive immigration tracking system.

The request had been anticipated for months, and in that time a handful of teams, led by some of the nation's biggest information technology and engineering firms, have prepared to vie for the contract, known as US VISIT, which could be worth up to $10 billion.

Homeland Security is looking for a company to serve as the US VISIT prime contractor, with responsibility for designing and implementing a system to collect fingerprints and photographs from millions of visitors entering and exiting the United States every year. Such biometric identifiers will be used to verify visitors' identities and compare them to lists of suspected or known terrorists.

The request for proposals was announced with little fanfare the day after Thanksgiving and was posted on the department's Web site. More than 200 pages long, the document says US VISIT will be constructed using task orders issued against a variety of contracts, including fixed-price agreements and cost-reimbursable contracts, in which the contractor would be compensated for what it spends and awarded an additional fee.

The department anticipates that the first task order award will be on such a reimbursable basis. It will require the contractor to form a program and project management regime to support the department's US VISIT office. Homeland Security intends to announce the winning firm by May 2004.

Homeland Security officials have already narrowed the field of potential contractors to three teams of companies, led by Lockheed Martin Corp., Accenture and Computer Sciences Corp.

Former Internal Revenue Service procurement executive Jim Williams leads the US VISIT program office. A veteran handler of large federal contracts, Williams has tapped several seasoned technology executives in government to assist him, including Scott Hastings, chief information officer of the Bureau of Immigration and Customs Enforcement.

Hello, Baghdad

An executive from one of the technology market's most prominent contractors may need to trade in his business suit for a Kevlar vest. GTSI Corp. announced Monday that Joe Draham, the company's vice president of government relations and congressional affairs, is taking a leave of absence in order to take a position in the Coalition Provisional Authority, the body overseeing the occupation of Iraq.

Draham has been named counselor to the Coalition Provisional Authority's new chief operating officer, Joseph "Keith" Kellogg, a retired Army general. Kellogg is taking a leave of absence from Oracle Corp., where he has served as senior vice president for homeland security. Kellogg is also a GTSI board member, and will resign that position now that he is heading overseas, said Dendy Young, GTSI's chief executive.

Young said that in Draham's new role, he would provide support to Kellogg in all areas of the rebuilding process underway in Iraq. Draham and Kellogg became acquainted after Draham came to GTSI and began making contacts with current and former government officials on the company's behalf, Young said. Kellogg chose Draham to accompany him to Baghdad.

Draham has served in Iraq before. He was a member of the senior communications staff for Gen. Norman Schwarzkopf, who commanded military operations in the first Gulf War.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.