Pentagon at 'midfield' in bid for clean books, officials say

Pentagon Comptroller Robert Hale Pentagon Comptroller Robert Hale Charles Dharapak/AP file photo

Invoking a Washington Redskins football metaphor, Pentagon Comptroller Robert Hale said the Defense Department is at “midfield” in its effort to meet deadlines for auditability of its financial statements, “but we’ve just got Robert Griffin III, and we’ve got the ball and we’ve got momentum,” he told a House panel Friday.

The department and all the military services are struggling to meet a congressional requirement for clean books by 2017, along with a tighter deadline of 2014 laid down by Defense Secretary Leon Panetta. At a hearing before the House Armed Services Oversight and Investigations Subcommittee, Chairman Rob Wittman, R-Va., asked five top officials for progress reports on the efforts of a department with, he noted, $700 billion in net operating costs and $12 trillion in assets.

Hale said he was “reasonably confident” of meeting the twin goals, but added he could make no guarantees. “We’ve been humbled by what’s coming in the next two years, and we’ve overpromised and underdelivered before,” he said. But Congress, he added pointedly, has “sapped some of the time we have for achieving readiness” with its continuing budget stalemate, which has required Hale and his team to execute “four shutdown drills and plan for things that don’t end up happening.”

Asked whether he favored the Audit the Pentagon Act sponsored by Sen. Tom Coburn, R-Okla., which, among other provisions, would threaten to move Defense auditing functions to the Treasury Department, Hale said he did not. “It would have the opposite effect than intended,” he said, saying Defense employees need such day-to-day operations in-house.

Hale and other witnesses noted that sections of each of the services have achieved audit readinesses, mentioning the Defense Information Systems Agency, the Defense Contract Audit Agency, the Army Corps of Engineers and several specific programs. The Marines are viewed as a model in the effort.

The problems have to with the need to document millions of transactions, cultural clashes, a lack of authority for across-the-board retraining and outdated information technology systems, the witnesses said.

Beth McGrath, the Pentagon’s deputy chief management officer, stressed that auditability must be achieved as part of a “broader effort to improve business processes across the department.” The keys are data conversion, business process standardization and IT, she added, noting the department in 2011 replaced 120 legacy computer systems and will replace 200 in 2012 and perhaps 150 in 2013.

The challenge, said Gladys Commons, assistant Navy secretary for financial management, is “these systems were not designed for auditing, so it takes time to eliminate manual work-arounds” to document transactions and present data. “There are millions of transactions involving thousands of people outside the department,” she said. “Those dependencies require constant nurturing and coordination.”

While the Air Force and Army representatives generally agreed with Hale that progress can be reported at the halfway mark, Commons said the Navy is more likely 30 percent of the way toward auditability, which she finds encouraging.

Hale said the training effort is hampered by a lack of authority for across-the-board requirements, though “not all employees need to become [certified public accountants].” Most of the senior executives, he said, are aware that the auditability effort is now a part of their performance reviews. “It’s tied to bonuses and raises, and there will be a stigma for those who don’t succeed,” he said. “It’s gotten people’s attention.”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.