Report reveals vulnerabilities in $17.5B ENCORE III IT program

May 15, 2023

The Department of Defense via the Inspector General’s Office (OIG) has issued a report highlighting serious vulnerabilities with the ENCORE III program, a large-scale IT endeavor with a $17.5 billion budget that delivers IT services and solutions to the Department of Defense and other agencies.

According to the report, contractors earned millions of dollars without sufficient verification of their work as a result of untrained overseers in charge of regulating contractor performance and monitoring project development. The report revealed that many of the CORs lacked the proper credentials. As a result, $24.2 million was given to contractors without reasonable certainty that contractor information technology services satisfied task order criteria.

The OIG says contracting officers representatives (CORs) appointed to manage the program were determined to be untrained, despite the fact that they were in charge of confirming payments and ensuring that the work conducted matched ENCORE III criteria.

The report, which only covered five of the ongoing 25 task orders, revealed that CORs failed to maintain consistent documentation of contractor performance inspections, failed to submit timely surveillance reports to contracting officers, and failed to review contractor interim vouchers to prevent improper payments. The report emphasizes the possibility of more waste inside the program, and the OIG recommends prompt action to address the concerns raised in the report.

The sources for this piece include an article in TheRegister.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn