Methodologies in Analyzing the Root Causes of Nunn-McCurdy Breaches
ResearchPublished Sep 27, 2012
Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes of overruns. Having conducted six analyses, the authors were able to develop a methodology for such analyses.
ResearchPublished Sep 27, 2012
Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes by examining program reviews, analyzing data, participating in contractor briefings, and holding meetings with diverse stakeholders. In two companion studies, the authors analyzed the reasons for six program breaches and developed a methodology for carrying out root cause analyses. This report documents that methodology, whose key components include the following steps: formulate a hypothesis, set up long-lead-time activities, document the unit cost threshold breach, construct a time line of cost growth recent events from the program history, verify cost data and quantify cost growth, create program cost profiles and pinpoint occurrences of cost growth, match the time line with profiles and derive causes of cost growth, reconcile remaining issues, attribute cost growth to root causes, and create postulates. This study represents an important chronicle of the approach to use in performing such analyses — one that others may use in their own analytic efforts. In addition, it gathers extensive documentation on the data sources used to examine the six program breaches investigated.
The research described in this report was prepared for the Office of the Secretary of Defense (OSD). The research was conducted within the RAND National Defense Research Institute, a federally funded research and development center sponsored by OSD, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.
This publication is part of the RAND technical report series. RAND technical reports, products of RAND from 2003 to 2011, presented research findings on a topic limited in scope or intended for a narrow audience; discussions of the methodology employed in research; literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; and preliminary findings. All RAND technical reports were subject to rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.