Report: DOD underestimated personnel system cost

DOD needs bettern internal controls over NSPS costs

The Defense Department has been underestimating the cost of its new personnel system, the Government Accountability Office concluded in a report released July 19.

In November 2005, DOD estimated it would cost $158 million to implement its National Security Personnel System, which incorporates a performance-based approach to pay. But GAO auditors found that the figure doesn’t include the full costs of deploying NSPS.

Moreover, the total amount of money DOD spent on NSPS between 2005 and 2006 can’t be determined because the department hasn’t established an oversight framework to capture the full costs associated with NSPS.

The report states that DOD’s $158 million estimate included some direct costs, such as $51 million for an NSPS program executive office. But it didn’t identify other direct costs, such as salaries for civilian and military personnel who support NSPS deployment departmentwide, according to GAO.

To get NSPS financial management on track, DOD needs to define all the costs relating to NSPS and construct a comprehensive oversight mechanism to ensure that those costs are fully captured and reported, GAO recommended.

NSPS program executive officer Mary Lacey said in a letter to GAO that “generally, we believe the report adequately portrays our efforts to capture costs” associated with NSPS. Lacey largely concurred with GAO’s recommendations in the report.

The findings of the report came as no surprise to the government’s labor unions, said Richard Brown, president of the National Federation of Federal Employees.

“We have been asking for a realistic estimate of the cost to implement NSPS since the plan’s inception but the department would not give it to us,” he said.

Under DOD plans, NSPS will replace the General Schedule personnel system for most of the department’s civilian employees.

The report was another setback on the financial-management front for the department. “DOD’s pervasive financial-management deficiencies have been the basis for GAO’s designation of this as a high-risk area since 1995,” GAO auditors said.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.