GSA Managers Faulted for Overruling Contracting Officers

Sergey Nivens/

This story has been updated. 

Acquisition managers at the General Services Administration “undermined the integrity of the procurement process” when they overruled underlings and altered the administration of $900 million in multiple award schedule contracts with major software firms, an audit found.

The managers' “improper intervention” in response to complaints from Oracle, Deloitte and Carahsoft -- in the form of extending flawed contracts and reassigning contracting officers -- resulted in contracts with "inflated pricing and/or unfavorable contract terms and extensions where contracting staff had determined such a decision was not in the best interests of the United States," according to a report from the GSA inspector general’s office.

The moves also “compromised the authority of contracting officers and adversely affected morale,” said the report written by regional auditor John Walsh. The report documents the IG office’s efforts to alert top GSA managers to the situation as early as April 2011.

As an instance of ill-advised intervention, the report described a Federal Acquisition Service division director who “provided Carahsoft officials incorrect information that contradicted some of the contracting officer’s requests for information. For example, the contracting officer requested information from Carahsoft regarding sales practices for Carahsoft manufacturers and requested that the company remove the term ‘commercial end users’ from its information because it does not sell to commercial customers.” But the division director bypassed the contracting officer and told the company to proceed as planned.

The IG recommended that the FAS forbid managers from intervening in contracting actions except in cases of misconduct or serious administrative issues. It recommended that communications between managers and contracting officers be fully documented; that FAS issue a memo in support of contracting officers’ independence; that FAS renegotiate or cancel the Carahsoft and Deloitte contracts and take “appropriate administrative action” against managers involved in the interventions.

Responding to a draft of the report, newly installed FAS Commissioner Tom Sharpe informed the IG that his team had already required a review of the Deloitte and Carahsoft contracts; placed the supervisor identified in the report on administrative leave pending further review; and conducted a top-to-bottom review of management controls in the Multiple Award Schedule program.

GSA spokeswoman Mafara Hobson said that since the arrival of acting GSA Administrator Dan Tangherlini 14 months ago, “GSA has refocused on its mission of delivering the best value in real estate, acquisition and technology services to government and the American people. The integrity of the FAS procurement process is critical to the work GSA does every day. The OIG report raises serious concerns, [and GSA] will continue working to ensure the integrity of the procurement process."

Sen. Claire McCaskill, D-Mo., urged continued vigilance. 

“This report details a shocking abuse of authority by a senior government official -- at a potentially significant cost to taxpayers,” she said in a statement. “The General Services Administration must ensure that anyone found to have aided in these abuses is held fully accountable.” 

Deloitte sent Government Executive a statement saying it had “just become aware of this IG report and [we] are trying to understand those conclusions that pertain to our contract. We believe our negotiations with GSA were at all times appropriate and conducted in good faith. In fact, the final negotiated rate structure is significantly lower than in the previous contract and provides substantial savings to taxpayers.”

(Image via Sergey Nivens/

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.