Our objective was to determine whether a series of contracts for Information Operations (IO) awarded by Multi-National Force-Iraq (W91GDW-08-D-4013, W91GDW-08-D-4014, W91GDW-08-D-4015, and W91GDW-08-D-4016) met Federal Acquisition Regulation (FAR) requirements. In addition, we also determined whether user needs were met by this procurement. See Appendix A for a discussion of the scope and methodology and prior coverage related to the objectives.
We performed this audit in response to a request from the Commander, U.S. Central Command to evaluate the IO requirements in support of Operation Iraqi Freedom. The request asked us to identify and evaluate the process to establish and execute IO requirements and to identify the resources applied to meet those requirements. The request also asked us to evaluate the contracting process and the use of private contractors in support of IO.
This is the first in a series of reports that will address the request from the Commander, U.S. Central Command. It discusses whether the indefinite-delivery, indefinite- quantity (IDIQ) IO contracts awarded by the Multi-National Force-Iraq (MNF-I) complied with the FAR. Subsequent reports will discuss the IO requirements process, and funding and personnel resources applied to meet IO requirements in Iraq.
We also performed this audit pursuant to Public Law 110-181, “The National Defense Authorization Act for Fiscal Year 2008,” section 842, “Investigation of Waste, Fraud, and Abuse in Wartime Contracts and Contracting Processes in Iraq and Afghanistan.” Section 842 requires thorough investigation and auditing to identify potential waste, fraud, and abuse in the performance of DoD contracts, subcontracts, and task and delivery orders for the logistical support of coalition forces in Iraq and Afghanistan. Further, section 842 requires thorough investigation and auditing of Federal agency contracts, subcontracts, and task and delivery orders for the performance of security and reconstruction functions in Iraq and Afghanistan.
IO Joint Publication 3-13, “Information Operations,” February 13, 2006, states that IO are:
the integrated employment of electronic warfare, computer network
operations, psychological operations, military deception, and operations security, in concert with supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own.