Changeflow GovPing Courts & Legal Federal AI Procurement OTA Consortia Integrity ...
Routine Notice Amended Final

Federal AI Procurement OTA Consortia Integrity Risks and Reforms

Favicon for www.americanbar.org ABA Legal News
Published
Detected
Email

Summary

The ABA Public Contract Law Journal published an analysis of federal AI procurement through Other Transaction Authority (OTA) consortia, finding that current consortia-based models prioritize speed over integrity safeguards. The article identifies governance gaps including opacity, limited oversight, and potential conflicts of interest that undermine competition and transparency in federal acquisition.

What changed

This law journal article analyzes how federal agencies, primarily the Department of War/DoD, use consortium-based OTA agreements to acquire AI systems outside the Federal Acquisition Regulation (FAR). The article identifies specific structural vulnerabilities in various consortia models—including traditional, open-enrollment, single-manager, and federated models—that restrict competition, enable contractor lock-in, and diminish public accountability.

The article proposes targeted reforms for agencies operating within existing authorities, including mandatory competition thresholds, enhanced public disclosure requirements, conflict-of-interest protections, mandatory cybersecurity compliance, and expanded government-led consortium models. While the analysis highlights corruption vulnerabilities created by current OTA structures, it does not create new legal obligations. Compliance teams should monitor these developments as they may inform future regulatory changes to federal procurement practices.

Archived snapshot

Apr 3, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.


Summary

  • Federal AI procurement policies prioritize speed over integrity safeguards, resulting in agencies acquiring opaque AI systems without adequate transparency or audit rights.
  • Recent deregulatory actions limit agencies' ability to negotiate AI-specific protections, creating exploitable corruption vulnerabilities.
  • Contractor lock-in, information asymmetry, and automation bias compromise procurement integrity and create conditions that enable corruption.
  • Practical recommendations offer near-term safeguards agencies can implement within existing authorities, challenging the premise that governance impedes innovation.

Martin Barraud via Getty Images

Jump to:



Abstract

This article critically examines the use of consortia-based Other Transaction Authority (OTA) and other transaction agreements (OTs) in federal procurement, with a particular focus on their alignment—or misalignment—with the core principles of government contracting: competition, integrity, and transparency. As the Department of War (DoW)—previously known as the Department of Defense (DoD)—and other federal agencies increasingly rely on OTA consortia to acquire emerging technologies, concerns have mounted over the opacity, limited oversight, and potential for conflicts of interest inherent in these arrangements. While OTAs were created to attract nontraditional contractors and promote adaptive innovation, consortia-based models have often undermined those goals by restricting competition, weakening ethical safeguards, and diminishing public accountability.






This article dissects the structure and operations of various consortia models—including traditional, open-enrollment, single-manager, and federated consortia—and identifies specific governance gaps and systemic vulnerabilities. Drawing lessons from the regulatory evolution of Indefinite Delivery/Indefinite Quantity (IDIQ) contracts, this article proposes a set of reforms designed to strengthen oversight without compromising flexibility. Key recommendations include establishing mandatory competition thresholds, enhancing public disclosure requirements, introducing conflict-of-interest protections, mandating cybersecurity compliance, and expanding government-led or-managed consortia models. These reforms aim to preserve the benefits of OTAs while ensuring that consortia-based arrangements uphold the legal, ethical, and strategic standards expected in federal acquisition.

I. Introduction: Competition, Transparency, and the Integrity Challenge

The Department of War’s (DoW)—formerly the Department of Defense’s (DoD)—growing reliance on consortia-based Other Transaction Authority (OTA) agreements has significantly altered federal procurement by operating outside the Federal Acquisition Regulation (FAR). While OTAs were designed to promote innovation and engage nontraditional defense contractors (NDCs), the increasing use of intermediary consortia raises serious concerns about competition and transparency—two foundational pillars that safeguard integrity in federal contracting. Unlike traditional procurement, consortia-based OTA arrangements often occur with limited public disclosure and oversight, weakening accountability mechanisms.

This article argues that reforms are needed to restore competitive fairness and transparency within OTA consortia models. Part II explains why competition and transparency are indispensable to maintaining integrity in public procurement. Part III outlines the statutory framework governing OTAs and highlights the regulatory gaps distinguishing them from a traditional acquisition. Part IV analyzes how various OTA consortia models function, identifying where they undermine transparency and limit competitive access. Part V draws oversight lessons from the Indefinite Delivery/Indefinite Quantity (IDIQ) contract model. Part VI proposes targeted reforms to ensure that consortia-based OTAs promote integrity without sacrificing the flexibility that they were meant to provide.

II. Competition and Transparency as Pillars of Integrity

Integrity in federal procurement depends on two essential structural safeguards: competition and transparency. Together, these principles create a system in which public resources are allocated fairly, efficiently, and free from improper influence.

Competition ensures that the government receives the best value by compelling vendors to offer innovative, cost-effective solutions. Under the FAR, “full and open competition” is the default rule, designed to ensure equal access to opportunities for bidders. When competition is limited or absent, the system risks entrenching incumbents, increasing costs, and discouraging participation from capable suppliers—particularly nontraditional contractors whom OTAs were meant to attract.

Transparency complements competition by subjecting procurement decisions to public and institutional scrutiny. Open processes and accessible information ensure that awards are based on merit rather than discretion, enabling oversight by both internal auditors and the public. In contrast, opaque arrangements—common in consortia-based OTAs—can obscure conflicts of interest, inflate costs, and exclude potential participants. Without visibility into solicitation, evaluation, and award processes, vendors cannot meaningfully compete, and the government cannot demonstrate stewardship of public funds.

A procurement system that lacks transparency cannot be competitive, and one that is neither competitive nor transparent cannot sustain integrity. As OTAs expand in scope and value, predominantly through private consortia, policymakers must reexamine how to embed competitive safeguards and transparency mechanisms within this flexible but less regulated framework. Doing so is essential not only for efficiency but for preserving public trust and ensuring that procurement decisions remain subject to ethical and institutional accountability.

Thus, competition and transparency are mutually reinforcing and essential to preserving integrity in federal procurement. They foster innovation while preserving public trust. Yet, OTA agreements often operate outside the FAR’s protections for these principles. The flexibility that makes OTAs attractive can also undermine competition and transparency. This risk is heightened when agencies use consortia, which often operate with limited visibility and oversight. To assess these risks, it is first necessary to understand the structure, purpose, and operational features of OTA agreements.

III. What Are OTAs and Why Do They Exist?

A. From Research and Prototype to Follow-On Production

The OTA allows certain federal agencies to make agreements outside standard procurement laws. Congress has extended OTA authority to at least eleven federal agencies—including NASA, DoD, the Department of Homeland Security, Department of Energy, Department of Health and Human Services, Transportation Security Administration, Federal Aviation Administration, and others—primarily to promote research and development and rapid prototyping. OTAs are meant to provide agencies with a flexible alternative to traditional contracts, so they can more easily partner with nontraditional contractors (NDCs) and tap into innovative commercial technologies. Focusing specifically on the DoW’s use of this flexible authority, under current law, DoW’s OTAs fall into three broad categories: research, prototype, and production OTAs. Each category carries distinct statutory requirements and opportunities.

Research OTA is used for basic, applied, and advanced research projects and is authorized by statute. Prototype OTA is used for developing prototypes or demonstrative technology; if a prototype OT is successful, it can lead to a follow-on production OT to implement or field the technology without a new competition. In essence, a prototype OTA agreement can be converted into a sole-source production OT for the same project, so long as the prototype was originally awarded using competitive methods and the possibility of follow-on production was noted.

The Office of the Under Secretary of Defense (OUSD) for Research and Engineering develops policies and guidelines for research OTs. To comply with the requirements of the research OTA, project teams must carefully structure their initiatives to meet several key conditions. First, the project must be centered on “basic, applied, [or] advanced research.” Second, to the maximum extent practicable, the research should not duplicate efforts already underway in other DoW programs, thereby promoting efficiency and originality in government-funded research and development (R&D) projects. The final critical requirement is resource sharing; government funding should, where feasible, be matched by the nongovernment participants, reflecting a shared investment in the development and future commercialization of the technology. Although the default expectation is a 50/50 cost share, this ratio is not rigid. It may be adjusted, based on a variety of factors, including the financial capacity of the research partner, their prior investment in the technology, the balance of commercial and military applications, the project’s inherent risks, and whether the work is considered precompetitive. This flexibility is designed to allow for tailored arrangements that support innovation while maintaining fiscal responsibility.

Prototype OTs are authorized under 10 U.S.C. § 4022(a). They are designed to develop, test, and evaluate new technologies and capabilities. A key feature of the prototype OTA is that it may lead directly to a follow-on production OT without the need for further competition, provided the original prototype was successfully completed. To meet the requirements of prototype OTs, the Agreement Officer must independently verify and document the prototype OT’s capability to meet certain criteria. The first criterion is that the prototype OT project must involve a real “prototype.” A prototype is a preliminary version of a system or component created to test and demonstrate the feasibility of a proposed technology or concept. It does not have to be a fully functional product but should allow for practical experimentation and data collection. A “prototype” can include innovative uses of commercial technologies for defense. A prototype OT must satisfy at least one of the following conditions: (1) at least one NDC or nonprofit research institution is participating significantly in the prototype project; (2) all significant participants in the transaction, other than the federal government, must be either small businesses, including those involved in the Small Business Innovation Research (SBIR) or Small Business Technology Transfer programs, or NDCs; (3) at least one-third of the total cost of the prototype project is funded by parties other than the federal government; or (4) the Senior Procurement Executive (SPE) for the agency determines in writing that exceptional circumstances warrant the use of a transaction that allows for innovative business arrangements or structures that would not be feasible or appropriate under a traditional contract. Prototype OTA projects focus on enhancing the DoW’s mission effectiveness or improving the systems, components, or materials intended for acquisition or currently used by the armed forces.

Follow-on production OTs, covered under 10 U.S.C. § 4022(f), are not standalone authorities, but, rather, stem from prototype OTA agreements. ​For a prototype to qualify for a follow-on production contract, competitive procedures must be used to select the parties involved in the prototype transaction. Under 10 U.S.C. § 4022(f), the agency can directly transition a completed prototype project into a follow-on production contract without additional competition. This approach streamlines the deployment of new technologies by allowing the DoW to quickly transition from prototyping to production once the prototype meets success criteria.

Given the strategic importance and potential value of these agreements, Congress established specific approval thresholds for large prototype and production OTs. Statutory limits on the value of OTA agreements necessitate high-level approval for large awards. For instance, a SPE of a military department, the Director of Defense Advanced Research Projects Agency (DARPA), or the Missile Defense Agency (MDA), has the authority to approve prototype OTs valued up to $500 million. The SPE or Director are further permitted to “delegate these authorities for up to $100 million to the [Head of Contracting Activity] and the Agreements Officer.” The AO is authorized to “enter into, administer, or terminate OT agreements” and make related decisions regarding the appropriate use of the authority granted. The AO is further permitted to “bind the Government only to the extent of the authority [specified] in the warrant certificate.” Prototype and production OT awards require statutory approvals that apply to all OTA awards made by the government, regardless of whether they utilize the consortia model. Beyond approval thresholds, agencies also maintain distinct policy frameworks for specific OTA categories.

Reflecting the expanding importance of these flexible mechanisms, DoW’s reliance on OTAs has grown significantly. In fact, the DoW is at the forefront of utilizing OTAs. From fiscal year (FY) 2016 to FY 2020, DoW OTA spending rose from under $2 billion to over $14 billion. From 2016 to 2022, the DoD (DoW) engaged in nearly 15,000 OTA transactions, totaling $70 billion. In FY 2022, the DoD (DoW) executed about 4,400 OTA transactions worth over $10 billion.

In light of the growing reliance on flexible acquisition tools like OTAs, executive action has sought to address critical supply-chain weaknesses and sustain technological competitiveness. Thus, in response to the need to revitalize the defense industrial base and promote greater flexibility in acquisition processes, President Donald J. Trump issued Executive Order 13806. This order instructed the then DoD to identify and address vulnerabilities in the supply chain. It emphasized the crucial role of flexible contracting mechanisms, like OTs, in enhancing industrial resilience. Subsequently, as more OTA projects come under the DoD’s (DoW’s) wing, the growing adoption of these contract highlights the importance of ensuring that consortia do not abuse these authorities.

Although the government has a choice to either contract with entities directly or through “consortia,” consortia-based OTAs constitute a significant portion of the DoW’s OTs. Between FY 2015 and FY 2019, the majority of DoD (DoW) OTA obligations were awarded to consortia. From FY 2019 through FY 2021, “DoD [DoW] obligated over $24 billion” on OTA awards to consortia for prototyping efforts, representing nearly two-thirds of all prototype OTA obligations during that period. These figures emphasize the significance of consortia-based OTAs in DoW’s (DoD) acquisition strategy, highlighting the need for a greater focus on this procurement model.

Consortia-based OTA agreements offer the DoW a responsive tool for acquiring cutting-edge technology and fostering nontraditional partnerships. Nevertheless, this flexibility must not come at the cost of transparency, competition, or integrity. Widespread use of consortia introduces new oversight challenges. Congressional scrutiny, expressed in multiple National Defense Authorization Acts (NDAA), signals persistent concern over the accountability deficits posed by OTAs. For example, the FY 2021 NDAA directed the Comptroller General to assess OTA use, noting the need for greater visibility and consistent oversight of consortia-based awards. This concern for the use of consortia in OTA awards reached the Senate. The Senate Armed Services Committee released a report on the NDAA for FY 2025, urging the DoD (DoW) to enhance the tracking and transparency of OTA consortia activities. The Committee proposed that the Under Secretary of Defense for Acquisition and Sustainment create a pilot program to effectively track the number and funding amounts of awards granted to small businesses and NDCs. This initiative would enhance oversight by incorporating awards made through OTA agreements, including those executed through consortia.

The OTA approach grants agencies freedom from many laws applicable to standard procurement contracts. For instance, when using OTAs, agencies are not bound by statutes like the Competition in Contracting Act (CICA) that mandates full and open competition, the Truthful Cost or Pricing Data Act that requires certified cost data for negotiations, or the Contract Disputes Act that provides standardized claim remedies. Additionally, all OTs are exempt from the Cost Accounting Standards (CAS) and the cost principles of FAR Part 31 that normally govern how costs are allocated and allowed. Detailed regulatory frameworks related to intellectual property, including the FAR and DFARS provisions concerning rights in technical data and software, do not automatically apply to OTs. Additionally, statutes like the Bayh-Dole Act, which regulate the ownership of inventions created with federal funding, do not extend to OTA agreements either. The technical data rights statutes specific to DoD (DoW) do not apply to OTs as well. These broad exemptions aim to reduce bureaucratic burdens and encourage participation from nontraditional contractors who may be deterred by government regulations.

However, the absence of essential protections creates significant and pressing concerns. Forgoing CICA eliminates the guarantee of open bidding. Bypassing statutes like the Truthful Cost or Pricing Data Act and regulations like FAR Part 31 increases the risk of overpayment because contractors need not submit certified pricing data. Further, without the Contract Disputes Act, OTAs lack standard avenues for resolving claims, leaving remedies to be negotiated in the agreement itself. Similarly, exempting OTAs from cost accounting rules permits contractors to apply inconsistent practices, which naturally increases the potential for misuse. Skipping FAR and Bayh-Dole’s IP provisions risks the government losing rights to inventions developed with public funding, potentially undermining future competition and system sustainability.

Despite these exemptions, some legal safeguards remain in place. All OTs must still comply with core fiscal and fraud-prevention laws and regulations. These laws include the Anti-Deficiency Act, the False Claims Act, 18 U.S.C. § 1001 (false statements), “criminal” False Claims Act, and federal whistleblower protections.

Congress exempted OTAs from traditional procurement rules through reduced administrative burdens to attract nontraditional contractors. Congress did so by eliminating requirements for certified cost accounting, extensive compliance audits, and rigid intellectual property terms. Thus, OTAs allow innovative firms—especially tech start-ups—to work with DoW without abandoning their commercial business models. Yet, this very flexibility underscores the need for agencies to create safeguards that the FAR would otherwise supply.

OTAs were created to inject speed and flexibility into federal acquisitions, but that same flexibility often produces gaps in oversight. While the statutory design of OTAs enables agile partnerships, it is the method of execution, mainly through third-party consortia, that affects transparency and competition on the ground. The following sections assess how competition and oversight function under OTA agreements and examine the structural complexities of the consortia model.

B. Aspirational Competition, Elusive Accountability

Although OTs are exempt from many procurement statutes, Congress has imposed some competition requirements. For example, 10 U.S.C. § 4022 directs the DoD (DoW) to use competitive procedures “to the maximum extent practicable” when awarding prototype OTs. Follow-on production OTs can proceed without new competition if, and only if, the original prototype was awarded competitively and the transaction’s participants successfully completed the prototype. Despite this statutory intent, meaningful oversight of OTA competition remains limited. The Government Accountability Office (GAO), which typically serves as the watchdog for procurement fairness, generally lacks jurisdiction to review the outcomes of OTA awards. The GAO and the Court of Federal Claims (COFC) will challenges asserting that OTA authority was improperly invoked—for example, if a non-research activity was improperly cloaked in an OTA—but they will not entertain post-award protests over the selection process itself. In limited circumstances, COFC or federal district courts may review disputes under the Tucker Act, but only if the OT is “in connection with” a procurement, and, even then, the review is drastically narrower than in FAR-based contracting.

Recent decisions, such as Raytheon Co. v. United States, reflect a growing consensus that COFC is the appropriate forum for some OTA protests. Still, the limited scope of review means that agencies face minimal accountability if they deviate from competitive norms. Disappointed offerors often have no forum in which they can challenge a flawed award process, even if Congress intended one to occur. Unlike FAR-based contracts—where competition is safeguarded by bid protests, regulatory oversight, and documentation requirements —OTA awards often operate in a legal twilight zone. Agencies may be required to use competitive procedures “to the maximum extent practicable,” but if they fail to do so, there is usually no meaningful consequence. This dubiousness undermines the principle that federal awards should go to the most qualified offeror, rather than the most favored, and reveals a concerning gap in accountability, where oversight relies on sporadic litigation and informal norms instead of established procedures.

Although competition is not wholly absent from OTA contracting, it is attenuated. This erosion of competitive safeguards raises urgent questions about how such practices align with the public interest, especially under consortia-based OTs, where private management adds a layer of opacity. These models allow for speed and flexibility but can also sidestep core principles of open, fair competition. As the next part explores, this tension becomes even more acute when awards are filtered through consortium management structures that control access and limit transparency. While the legal framework of OTAs sets the stage for flexibility, the way that these agreements are executed, primarily through consortia, introduces new levels of complexity. To understand the practical effects of OTA usage, it is essential to examine how consortia operate as intermediaries during the procurement process. The next part dissects the structure and governance of consortia-based OTAs, revealing how different consortia models influence competition, affect integrity, and inhibit transparency.

IV. Consortia-Based OTAs Dissected

Having covered the statutory and operational landscape of OTAs, the next step is how these agreements are carried out through consortia. Each consortium model, ranging from fixed-membership to open-enrollment structures, presents its own distinct implications for how awards are made and who gets access to funding.

A consortium under an OTA is a structured alliance of private firms that band together to bid on and perform OTA projects. The government typically enters into a base OTA agreement with a single consortium entity—usually managed by a Consortium Management Firm (CMF) or Consortia Management Organization (CMO)—which then acts as an intermediary, issuing project solicitations to consortium members and handling the distribution of funds. For example, the National Armaments Consortium, managed by Advanced Technology International, supports over 1,000 members across various DoW components. Similarly, the Medical Chemical, Biological, Radiological, and Nuclear (CBRN) Defense Consortium and the Information Warfare Research Project each aggregate dozens of vendors under a centralized management model.

Largely, an OTA consortium arrangement has three key components: (1) the government sponsor (the federal agency or contracting office using the OTA); (2) the consortium manager (an entity that manages the consortium’s operations); and (3) the consortium members (the companies and organizations that actually perform the projects). There are various adaptations of this general framework, and several distinct models of consortia-based OTAs have emerged.

Each adaptation showcases distinct models of consortia-based OTAs arrangements. The most common models can be categorized as traditional consortia, open-enrollment consortia, single-manager consortia, and “federated” (government-led) consortia. These models are promoted as ways to spur innovation and speed up procurement, but, in practice, they share the same core problems: limited competition, murky processes, and a lack of transparency.

Before delving into each model, it is helpful to understand the basic operation of a consortium-based OT. Typically, the government (through a contracting office) awards a base OT to the consortium’s managing organization. The consortium manager then issues calls for proposals to the consortium’s member companies (sometimes in the form of mini-competitions within the consortium) for specific projects covered under the OTA. The manager receives proposals and often plays a significant role in vetting or down-selecting which proposals are forwarded to the government for final selection. Once the government (in consultation with the consortium manager) chooses a proposal, the project award is usually executed in one of two ways: either the government issues an OTA project award directly to the chosen member (as a sub-agreement under the base OTA), or the government modifies the base OTA with the consortium manager to fund that project, and the consortium manager in turn signs a separate contract or agreement with the chosen member to perform the work. In both scenarios, the consortium manager typically charges a fee (often a percentage of the project value) for its role in administering the consortium. The consortium members usually pay annual membership fees as well, creating what some have criticized as a pay-to-play environment. Many current OTA consortia are essentially multiple award contracts (MACs). The government awards an OT to a consortium management firm that manages the MAC arrangement but does not conduct research or prototyping. Typically, no formal agreements exist among the research companies, only individual contracts with the management firm.

Richard Dunn, a prominent OTA expert, candidly explained how this structure operates in practice. As the OTA sponsor, the government often maintains a close relationship with the consortium manager, who serves as a conduit for communications and opportunities. Companies pay to join the consortium, sometimes paying quite substantial fees, in the expectation that membership will afford them access to project solicitations. In theory, the consortium manager is meant to administer opportunities to all members; in practice, however, not all members get equal access—some may never see a real opportunity despite paying fees. Dunn observed that consortium managers typically keep a percentage of each project award as their own fee, which comes off the top of the funding intended for prototyping and innovation. Consortia management fees can be as high as eight percent, creating administrative burdens that reduce funds available for actual innovation. These high fees, combined with limited oversight, create a shadow system of contracting with significant vulnerabilities. This dynamic creates a perverse incentive that the consortium manager’s goal may subtly shift from facilitating innovation to simply maximizing the volume of awards (and fees) flowing through its consortium. The result, Dunn noted, is that the current OTA consortium system often fails to deliver truly innovative performers to the government. Instead, it streamlines the process of steering awards to the consortium manager’s preferred members, while the public and many non-favored members are shut out of oversight.

Transparency failures in OTA consortia management are compounded by the DoW’s inability to reliably track OTA awards through the Federal Procurement Data System-Next Generation (FPDS-NG). While the “OUSD [for Acquisition & Sustainment] requires contracting officials to track OTs in the FPDS-NG,” the system is not designed to distinguish between stand-alone and consortia-based awards or to capture project-level data. As a result, essential information on obligations and recipients is frequently absent or inaccurate. A 2021 audit by the DoD (DoW) Inspector General revealed pervasive misreporting, including one project overstating awards by $25.3 million and understating obligations by $17.3 million, while another reflected phantom projects (valued at $50 million). Compounding these failures, contracting officials did not meet the statutory reporting mandates under 10 U.S.C. § 4022(a)(2)(B) (formerly 10 U.S.C. § 2371(b)), which require reporting of follow-on agreements exceeding $500 million, including the value of potential options under the agreement.

Recognizing the seriousness of these deficiencies, Congress has increasingly scrutinized OTs transparency. Legislative reports and NDAA provisions have repeatedly highlighted concerns about the DoW’s ability to track OTA awards accurately, particularly those involving consortia arrangements where oversight gaps appear most pronounced. Congressional concern over reporting shortcomings reflects a deeper problem: without accurate and standardized tracking of OTA performance, oversight is weakened, and the public remains in the dark about how billions of dollars are spent. These shortcomings further magnify the challenges posed by emerging consortia models.

A. Traditional Consortia’s Fixed Memberships Create Insular Clubs

One of the most common structures is the traditional consortium, characterized by a fixed membership, where a predefined group of entities collaborates on government projects under long-term agreements based on some internal qualifications that differ from consortium to consortium. These arrangements are often managed by a consortium management organization (CMO) that serves as the intermediary between the government and consortium members. The OTA agreements with a CMO typically span several years and establish an exclusive ecosystem in which only members can receive solicitations and submit proposals.

Proponents of this structure argue that traditional consortia allow government agencies to engage with a stable, vetted network of contractors, encouraging long-term planning, continuity, and sustained investment in research and development. In theory, this kind of closed-loop model is supposed to encourage strategic partnerships and long-term innovation. Members invest in capabilities relevant to the consortium’s focus area, with the hope of gaining better access to projects. However, the very features that make traditional consortia efficient can also limit competition and innovation. For one, the restricted membership creates a high barrier to entry for new or smaller vendors—especially nontraditional defense contractors or startups that lack the resources or insider knowledge to join. As a result, the pool of eligible participants remains shallow, potentially reducing the diversity of technical solutions presented to the government. Over time, a fixed group of vendors may become complacent or aligned in their approaches, leading to fewer breakthrough ideas. The exclusivity of the consortium can inflate incumbency advantages, when members continue to win by virtue of established relationships rather than merit alone.

These structural risks are not limited to conceptual critique—they manifest in practice and have concrete implications for procurement integrity. A 2022 GAO report highlighted cases where traditional consortia led to de facto sole-source awards. The report indicates that the GAO found barriers to NDCs joining consortia. This lack of outside competition leads to higher project costs and possibly deprives DoW of a superior solution that an external entrant might have offered. Without a broader solicitation, it is difficult to ensure that the award goes to the most qualified vendor rather than simply the most entrenched. The report recommended increased oversight to curb such anticompetitive practices. It is not surprising that in such arrangement, there may be multiple instances when long-standing consortium members receive repeat awards, further reinforcing concerns about innovation and conflicts of interest.

A related problem in traditional consortia is the recycling of awards among the same members. The consortium manager—often responsible for conducting internal solicitations and selecting finalists—may have incentives to favor established members in order to retain their membership fees and institutional influence, potentially cycling awards to incumbent firms at the expense of broader competition. Because the government often delegates proposal evaluation to the consortium manager, the usual checks and balances of source selection are effectively outsourced. If the manager harbors bias or faces conflicts of interest, little prevents those factors from distorting the outcome.

In practice, the oversight functions normally performed by the government fall to the CMF, which may be more focused on administrative continuity and financial stability than on ensuring robust competition. The consortium manager’s fee is often a percentage of each award, which means the manager benefits from larger awards and potentially from steering work to certain firms that guarantee quick execution or additional business. This opaque fee-driven structure undermines the principle of open competition and can result in stagnation and insularity. Over time, innovation may actually suffer if the same handful of companies repeatedly get the awards—the exact opposite of what OTAs were supposed to achieve.

B. Open-Enrollment Consortium: Inclusive on Paper, Selective in Practice

In contrast to the closed membership of a traditional consortium, an open-enrollment consortium allows new members to join and participate at any time, with minimal barriers to entry. Membership is not capped or pre-selected; any company or organization that meets a basic eligibility (often simply signing the consortium agreement and paying a fee) can become a member. Government agencies work with open consortia by issuing broad agency announcements or general solicitations accessible to all registered members. On the surface, this structure seems to maximize accessibility and inclusivity. One might expect open enrollment to equate to more competition, since, theoretically, any interested vendor can sign up and start bidding on projects.

Conversely, open-enrollment consortia often fail to deliver truly fair competition. While membership is technically open, many such consortia become dominated by a few incumbent firms that have established relationships with the consortium manager or with the government sponsor. The consortium management still wields discretion over how opportunities are communicated and which member proposals get forwarded to the government.

Nothing in the OTA law requires the consortium to invite all members equally for every project; the manager might solicit white papers from a subset of members or might screen submissions before the agency ever sees them. The manager’s ability to selectively solicit or screen member submissions without transparent or equal opportunity for all consortium members creates opportunities for bias or favoritism behind closed doors. Newer or smaller vendors, even though they are members on paper, may find themselves at a disadvantage if they lack the influence or track record within the consortium. The informal barriers—such as not being in the inner circle of communication or not hearing about opportunities early—can disadvantage outsiders almost as much as an outright closed consortium would.

Transparency is also a casualty in many open consortium arrangements. These consortia are not required to publish detailed evaluation criteria or provide meaningful award debriefings to unsuccessful offerors. A firm that loses out might not know whether the selection was made fairly or what it could improve on, information that is normally available (at least in part) in FAR competitions. This lack of public disclosure makes it hard for any external party to oversee or question the process. A 2021 DoD (DoW) Inspector General audit revealed that “DoD [DoW] contracting personnel did not consistently execute OTs awarded through consortia in accordance with applicable laws and regulations,” highlighting issues such as inadequate tracking and documentation in awarding consortium OTs. Similarly, a 2022 GAO report emphasized the Department’s limited insight into consortia funding and recommended systematic tracking and improved planning for consortia-based OTA awards. Many of these consortia are based on an open-enrollment model. In theory this model appears to offer all consortium members an opportunity to compete for project awards, in reality, because selection criteria often are not disclosed and task order decisions occur outside public view. Accordingly, although in theory this model appears to offer all consortium members an opportunity to compete for project awards, in reality, that opportunity is more constrained than it seems. Because selection criteria are often not disclosed and task order decisions occur outside public view, it is reasonable to infer that consortium managers—who act as gatekeepers—may exercise selective discretion over which members are invited to submit or advance proposals. Absent enforceable transparency rules, even open-enrollment consortia can function as exclusive clubs.

Moreover, open enrollment consortia often operate outside many of the front-end vetting requirements that traditional contracting imposes. Under the FAR, would-be contractors must clear a number of hurdles: they must be registered in government databases, have certain compliance certifications, meet responsibility standards (including financial stability and satisfactory performance history), and often adhere to baseline cybersecurity requirements. In an OTA consortium, companies face relatively minimal barriers to entry. There is usually no requirement to demonstrate past performance or financial fitness before bidding on projects. This practice raises a fundamental question: if virtually anyone can join and bid, how does the government ensure that awards are made to firms that are actually capable and reliable? The answer is, often it does not. Traditional FAR procurements note the importance on a bidder’s past performance and responsibility precisely to ensure that competition yields a meaningful choice among qualified offerors. In many OTA consortia, by contrast, the initial competition may simply be among whoever submits proposals, regardless of their track record or capability. This procedure undermines the quality of competition. It is not just the number of bidders that matters, but whether the agency can distinguish those bidders by merit. Without clear criteria, the task of ensuring the award went to the best-value choice becomes difficult for a contracting officer.

The lack of prequalification checks in open consortia is exacerbated by the absence of financial due diligence. In FAR contracts, a contracting officer must confirm that a prospective awardee has adequate financial resources or the ability to obtain them (a part of the responsibility determination). Companies sometimes must undergo financial capacity reviews or even cost-accounting audits for certain contracts. However, in open OTA consortia, if a company fails to deliver due to financial insolvency or mismanagement, it may interfere with the prudent expenditure of taxpayer dollars because of the lack of protections under OTAs. Likewise, standard compliance requirements (like maintaining an active registration in the System for Award Management (SAM), or abiding by various socioeconomic and labor regulations) usually do not apply before an OTA award, since those are FAR-based mandates. An open consortium member can be eligible to compete with far fewer representations and certifications than would be required in a normal federal contract. This expedited onboarding might invite a greater variety of participants, but it dampens the rigor of the process that normally screens out unqualified or unscrupulous players.

One especially alarming gap in open consortia is cybersecurity. As the DoW moves toward enforcing stricter cybersecurity standards, including NIST SP 800-171 and the Cybersecurity Maturity Model Certification (CMMC) for defense contractors handling sensitive data, traditional contractors are being held to improve their cybersecurity protocols.

The consortium model currently lacks a uniform mechanism to ensure its participants protect data because most OTA consortia—particularly open ones—do not mandate that all members meet these cybersecurity standards. Theoretically, a company could join and handle project data without any certification, potentially exposing sensitive government information to cyber threats. This state of affairs is a significant oversight, given that many OTA projects involve advanced technology and controlled unclassified information. If one goal of OTAs is to bring in nontraditional firms, it should not come at the expense of creating a cybersecurity weak link in the Defense Industrial Base.

It is true that open-enrollment OTA consortia incentivize a larger pool of potential participants, but they do so at a high cost to procurement integrity. By minimizing or bypassing the standards related to past performance, financial responsibility, regulatory compliance, security, and technical qualifications, this model may increase the quantity of bidders but at the risk of quality and fairness. The superficial openness of these consortia belies the fact that real competition can still be stifled—through insider advantage, lack of transparency, and uneven enforcement of rules. What appears to be an inclusive free-for-all can mask an underbelly of ambiguity and bias, ultimately harming the mission to “lure in” nontraditional innovative vendors.

These weaknesses raise an even deeper concern: when minimal oversight combines with broad discretion, the consortium structure can begin to function less like a platform for open competition and more like a mechanism for selective control. In certain cases, the consequence is by design: the very structure of the consortium enables the concentration of control with little accountability. Like a velvet-rope bouncer outside a private club, the consortium manager decides who gets through the door. In theory, what appears inclusive can filter out those lacking connections, visibility, or favor within the consortium’s informal hierarchy. This pattern becomes most pronounced in the next model: the single-manager consortium, where control is not just exercised, but institutionalized.

C. Single-Manager Consortium: One Gatekeeper, Many Doors

This structure is a variation in which a single organization—typically the consortium management firm—plays an outsized role in the entire process. While the government still executes the OTA with the consortium, operational control is effectively concentrated in one private entity. The consortium manager not only handles administrative tasks (such as issuing solicitations and collating proposals) but may also fully control the evaluation and selection of project awardees, often with minimal government involvement in the selection. Fundamentally, the consortium manager acts as a proxy contracting officer: preparing the calls for proposals, receiving and evaluating submissions, negotiating project agreements, and then allocating the government-provided funding to the chosen consortium members. The government’s role can be reduced to merely approving the manager’s choices and signing the funding over.

This model concentrates a tremendous amount of power in a private intermediary. It introduces serious competition, transparency, and integrity vulnerabilities because the consortium manager is a nongovernment entity that may have its own interests and relationships. The manager may even oversee affiliates or subdivisions. For example, a consortium management firm could also own or be affiliated with one of the consortium’s member companies. This concentration of power creates a glaring conflict of interest, where the manager could steer awards to its own subsidiaries or partners.

Unlike in FAR-based procurement, where organizational conflicts of interest (OCIs) must be disclosed and mitigated, the OTA framework often lacks formal rules to prevent this kind of self-dealing. There is typically no legal requirement for the consortium manager to recuse itself or be impartial; the integrity of the process is largely left to whatever internal governance the consortium sets (which might be weak or nonexistent).

Instances of abuse in single-manager consortia are not uncommon. An illustration came out of the COVID-19 pandemic response. A GAO inquiry in 2021 found that DoD (DoW) obligated about fifty-eight percent of its COVID-19 related OTA funds through a single consortium management firm, and notably, DoD (DoW) did not publicly disclose which consortium members ultimately received those OTA awards. The concentration of awards through one manager and the lack of disclosure made it extremely difficult for oversight bodies (or the public) to track where billions of dollars actually went. GAO expressed concern that this opacity could hide problems like favoritism or misuse of funds, and recommended that DoD (DoW) improve transparency for OTA consortium awards. The single-manager model was essentially operating as a shadow procurement system inside then DoD’s pandemic response. In an ordinary federal procurement, such conduct would likely trigger investigations or legal action. Nevertheless, in the OTA consortium realm, many decisions happen under the opaque auspices of the consortium’s internal processes, with no FAR provisions to invoke. Only after-the-fact scrutiny can bring the issue to light. This example underscores a commonsense notion that when a consortium manager has financial or organizational ties to certain members, the fairness of awards is at serious risk. The manager might justify choices under the broad flexibility of OTAs, and without transparency, neither the government nor other members can easily challenge those choices.

A widely recognized vulnerability in OTA-based consortia—one that single-manager structures are particularly ill-equipped to prevent—is the risk of double billing. The practice involves a contractor charging for the same equipment or materials under both an OTA and a FAR-based contract. Because single-manager consortia often operate without centralized oversight or integrated financial tracking, they lack the mechanisms needed to detect and prevent such duplication.

Taken together, the features of the single-manager model reveal a tradeoff: streamlined coordination in exchange for diluted safeguards. By outsourcing fundamentally governmental functions (like competitive selection of contractors) to a private entity, this model invites conflicts of interest and ethical lapses. No built-in protest rights or federal oversight mechanisms exist to keep the manager honest. The combination of concentrated power and lack of transparency can yield egregious outcomes, undermining competition and integrity more severely than even the other models discussed. Any benefits in streamlining must be weighed against the significant risk that a self-interested manager can turn the consortium into its personal fiefdom, at the taxpayers’ expense. To address these challenges, some agencies have experimented with alternative models that reassert government control while retaining OTA flexibility. The most notable of these is the federated consortium model.

D. Federated Consortium: Agency-Governed Collaborative Networks

Unlike previous consortium structures, a federated consortium places the agency in a central coordinating role. Here, the government manages and oversees multiple collaborative groups (or sub-consortia) that are all organized under one OTA umbrella. In a federated model, instead of having a single private consortium manager dictating internal operations, the government organizes the consortium into thematic or project-based subgroups and often directly coordinates their efforts. The purpose of this model is to allow the government to access specialized expertise across different sectors or technical domains while maintaining a bit more centralized oversight than in the purely private-manager models. One way to envision a federated consortium is as an umbrella consortium ** broken into several cells: for example, one sub-consortium might focus on medical technologies, another on robotics, another on cybersecurity—all under the auspices of one large OTA agreement. The agency’s program managers or contracting officers play an active role in steering each subgroup, issuing task orders or project solicitations to specific subgroups based on the agency’s needs.

The federated model attempts to combine flexibility with oversight by involving government officials in the consortium management. However, it also presents challenges. A sub-consortium or project team may add an intermediary stakeholder, effectively reducing the consistency of control across all subgroups. The lack of a single standardized management structure means practices can vary significantly within the same overall consortium. One subgroup might be very transparent and competitive if led by a diligent program officer, while another subgroup might be relatively closed or insular if the government lead for that group is less rigorous. In essence, federated consortia can suffer from uneven governance, strong in some pockets, weak in others. Without a unifying set of rules (like the FAR provides in a normal contracting program), the risk is that the overall consortium lacks coherence in how it ensures competition and integrity.

Competition in federated models can still be unintentionally restricted. If the government tends to reuse the same subgroup for similar tasks, it could end up repeatedly awarding projects to the familiar members of that subgroup, limiting opportunities for others in the consortium at large. For example, if Sub-consortium A has been tasked with all AI-related prototype projects, and it contains five companies, those five will keep getting the AI work while equally qualified companies in Sub-consortium B or C (or outside the consortium entirely) never get an opportunity. The federated approach thus can still create silos of participation.

Transparency in federated consortia is generally better than in purely private-managed ones because the government usually discloses at least the broad evaluation criteria and outcomes for each task order to the consortium. There may be collaboration events where all members discuss ways to address the challenges of communication between government and industry. However, the level of detail is often far less than in FAR procurements and can vary by subgroup. There is typically no public posting of OTA task order awards or a comprehensive database of which consortium members received funding and for what (unless the agency voluntarily shares that information). Oversight is also fragmented—there is no independent entity consistently monitoring all the subgroups.

Despite these issues, some may see federated consortia (or generally government-managed consortia) as a preferable alternative to the industry-run models. By keeping the government’s hands in the mix, this model can inject more accountability. It can also reduce the management fees paid out to third parties; membership fees might be lower or nonexistent, and more of the OTA funding can go directly to project performance rather than overhead. If designed well, a federated approach could enforce common standards across subgroups (for example, by issuing a standard operating procedure for how each subgroup solicits and evaluates proposals). In practice, however, implementing uniform oversight across a federated consortium has proven difficult. Without the FAR, the consortium still relies on the agency’s vigilance and ad hoc rules rather than any codified regulation. The success of this model thus hinges on effective governance and transparency measures put in place by the agency. If those measures falter, a federated consortium can devolve into a patchwork of inconsistent practices and the same pitfalls of favoritism or opacity that plague other models.

Hence, consortia-based OTAs—whether traditional, open, single-manager, or federated—present a spectrum of trade-offs. Traditional and single-manager consortia tend to concentrate control (either in fixed members or a powerful manager), risking exclusion of outsiders and conflicts of interest. Open consortia broaden participation but often only superficially, while sacrificing important vetting and oversight. Federated consortia aim to bring the government back into a leadership role, but they require robust internal controls to avoid replicating the weaknesses of the other models. Across all types, a common theme emerges: the current structures often bypass the very safeguards of competition, integrity, and transparency on which the procurement system relies. The following parts will discuss solutions to realign consortia-based OTAs with those core principles, drawing on both historical lessons and new ideas.

V. Toward Greater Accountability: Lessons from IDIQ Oversight Mechanisms

The evolution of IDIQ contracts offers a compelling analogy for improving oversight in consortia-based OTA agreements. Initially lauded for their flexibility, multiple-award IDIQs faced criticism because of the lack of transparency, competition and accountability required. Over time, however, Congress and procurement officials implemented oversight mechanisms that improved transparency and competition without diminishing the IDIQ model’s efficiency.

The foundational shift began with CICA’s enactment in 1984, which requires full and open competition for the initial award of an IDIQ contract, unless a statutory exception applies. In 1994, the FAR was amended to include FAR Part 16.5, obligating agencies to provide all IDIQ awardees a “fair opportunity” to compete for task and delivery orders under multiple-award contracts. To further ensure fairness and transparency, agencies must disclose evaluation criteria in solicitations, document award decisions, and offer debriefings to unsuccessful offerors upon request. Integrity safeguards are housed in FAR Subpart 9.5, which mandates mitigation of OCIs, and FAR Part 3, which codifies prohibitions against kickbacks and other unethical conduct.

Accountability is reinforced through limited bid-protest rights. Since the mid-1990s, contractors have been permitted to protest task or delivery orders exceeding thirty-five million dollars at GAO, especially when the protest alleges that the order improperly alters the scope, duration, or ceiling of the underlying contract. Oversight agencies such as the Defense Contract Audit Agency (DCAA) and Inspectors General regularly audit IDIQ programs to assess compliance and performance. These audits ensure accuracy, completeness, and efficiency.

Public notice requirements further enhance transparency. Contract opportunities must be published on systems such as SAM.gov, and agencies must clearly identify evaluation factors for both contract and task order awards. In its 2017 review, GAO found that these oversight mechanisms did not impair the effectiveness of IDIQ contracts.

These reforms demonstrate that oversight need not come at the expense of speed or adaptability, applying similar reforms to OTA consortia—such as establishing eligibility criteria, enforcing fair opportunity practices, mandating transparency in project selection, and authorizing limited protest rights—to meaningfully enhance accountability without undermining the intended flexibility of OTAs.

VI. Reforming OTA Consortia, Structural, and Procedural Solutions

Successful procurement models like IDIQs evolved from similar concerns to those that are present in OTA consortia. These lessons provide a strong foundation for addressing the governance flaws in OTA consortia. Learning from the IDIQ experience, several specific reforms could address the challenges posed by consortia-based OTAs. These proposals aim to preserve the benefits of OTAs—agility, access to innovation, and reduced bureaucracy—while reintroducing essential safeguards for competition, transparency, and integrity.

One structural solution is to expand federated (government-run) consortia in lieu of consortia managed by private firms. In a federated consortia model, the agency itself performs all consortium management functions: issuing solicitations, collecting proposals, and directly awarding project-level agreements to consortium members. This solution removes the concern of contractors performing what should be inherently governmental functions. It also eliminates overhead fees paid to consortium managers and allows the agency to maintain traceability and transparency at the project level. Without a for-profit intermediary, the government can ensure that each project award is made directly to a consortium member on merit, and it can more freely share information about those awards. While a government-led approach may require additional internal resources, it realigns responsibility and accountability with the agency and avoids the “black box” of a private consortium manager.

To prevent sole-source or closed-loop awards within consortia, regulations could establish mandatory competitive procedures for any consortium award above a certain dollar value. For instance, if a project award exceeds a set threshold, the agency might be required to either compete it outside the consortium or at least certify that an adequate number of consortium members were given a fair chance to compete. Another approach is to periodically reopen consortium membership or solicit outside proposals for projects, so that long-term members do not become the automatic default winners. Just as multiple-award IDIQs occasionally on-ramp new contractors to sustain competition, consortia could periodically accept new entrants or consider external bids for high-value projects.

Mandatory disclosure can significantly improve transparency. At a minimum, after an OTA consortium award is made, the agency should publish the project title, the consortium involved, the winning member, the award value, and a high-level description of the work. Additionally, there should be reporting on selection criteria and process—perhaps a summary of how many proposals were received and the general basis for selection. Regular public reports on OTA consortia activities (for example, an annual report) could detail the number of projects, total funds awarded per consortium, fee structures, and participation of small or nontraditional businesses. These disclosures would enable external oversight by Congress, GAO, and the public and would shine light on what has so far been an opaque corner of procurement.

An independent review body or empowered Inspector General should be tasked with conducting periodic audits of consortia-based OTA awards. This oversight could examine whether consortium managers are following required procedures, whether any conflicts of interest or self-dealing are occurring, and whether the consortium model is delivering value. Congress could establish a dedicated OTA Consortia Ombudsman or expand GAO’s authority to audit consortium operations even if GAO cannot legally decide protests on OTA awards. The goal would be to create an independent check that can investigate complaints (e.g., from a consortium member who suspects bias) and recommend corrective actions. Additionally, requiring consortium managers to self-report data (such as breakdowns of how many opportunities each member got, or any relationships that they have with members) could assist oversight bodies in detecting patterns of favoritism or corruption.

Beyond process and transparency reforms, national security threats also demand attention to hidden vulnerabilities in the OTA model. Another key area of reform should be supply-chain visibility and risk analysis. OTAs often lack adequate insight into sub-tier contractors and supply chains used by consortium members. This gap leaves the DoW vulnerable to foreign infiltration through compromised microelectronics or malicious hardware. To mitigate these risks, OTA frameworks should (1) require full transparency regarding all supply chain tiers involved from prototype through production; and (2) incorporate Supply Chain Risk Management (SCRM) as a formal evaluation criterion during project selection. Making SCRM a core part of the evaluation process would align OTA use with broader national security goals and close a serious vulnerability in current practice.

To address gaps like the previously noted cybersecurity risk, the DoW could mandate that all consortium members adhere to baseline security standards as a condition of receiving any OTA award. For example, if a project involves controlled unclassified information, only members who are CMMC-certified at the required level should be eligible to compete. The consortium manager should be responsible for verifying certifications or compliance for its members (subject to audit). Similarly, basic responsibility criteria (such as not being debarred, having a satisfactory performance record, etc.) should be affirmed for members before they can receive awards. The consortium should not be a loophole to evade standards that the government would normally impose to protect itself.

Many of the measures discussed in Part IV can be directly applied via policy or legislation to OTAs. For example, Congress could amend the OTA statutes to require that, if an agency uses a consortium, it must ensure a “fair opportunity” for all consortium members for each award, similar to the FAR’s requirements for IDIQs. The statute could also clarify that certain protest-like challenges are permitted—for instance, allow a disappointed consortium member to appeal to the agency or a neutral official if it believes it was unjustly excluded from a competition. Another codified measure could be requiring agencies to compete the selection of consortium managers themselves (i.e., not just signing an OTA with the first consortium that comes along; issuing a solicitation so multiple consortium organizations can offer better terms or broader membership). By writing these expectations into law or regulation, it will no longer be optional for consortium managers to behave fairly—it will be mandatory.

Finally, as a general principle, the acquisition community should adapt the hard-won lessons from IDIQs to OTAs. IDIQ contracts initially faced the same criticisms now aimed at OTAs: lack of transparency, risk of vendor lock-in, and limited oversight. Over time, a framework evolved that preserved IDIQ flexibility while instituting competition and oversight guardrails. The same can be done for OTAs. Reforms that introduce structured competition, rigorous oversight, and greater transparency to consortia-based OTAs will help these agreements deliver on their promise of innovation without sidestepping the values that underpin public procurement.

By implementing the above-mentioned reforms, agencies can continue to leverage the speed and flexibility of OTAs—accessing cutting-edge tech and nontraditional contractors—but under conditions that ensure taxpayers are protected and that the playing field is fair. These changes need not be onerous; they are about instilling accountability. With thoughtful adjustments, consortia-based OTAs can evolve from a shadow system operating outside the usual rules into a tool that balances innovation with integrity.

VII. Conclusion: Bringing Light to the Shadows

Consortia-based OTA agreements have become a cornerstone of the DoW’s strategy to acquire cutting-edge technology at speed. But, in prioritizing flexibility and bypassing traditional procurement safeguards, these arrangements have veered into opaque territory. While the intent behind OTAs—nimbleness, innovation, and inclusion of nontraditional vendors—is sound, the current consortia structures often achieve the opposite: restricted competition, insider advantage, and diminished oversight. The structural features of many consortia models, particularly those managed by private firms, enable conflicts of interest and obscure the award process from public scrutiny. Even open-enrollment consortia suffer from informal barriers and limited accountability.

These weaknesses mirror early criticisms of IDIQ contracts, which were later corrected through targeted reforms. It is time to apply similar guardrails to OTA consortia. Such change calls for building transparent selection procedures, setting competition thresholds, holding consortium managers accountable, and giving federal agencies more direct control over oversight. Congress and policymakers must recognize that innovation does not require secrecy and flexibility does not justify favoritism. If left unchecked, OTA consortia risk becoming a parallel procurement universe—one that spends billions with little visibility, weak safeguards, and no clear way for outsiders to challenge unfair practices. The reforms proposed here do not aim to dismantle the OTA model, but to legitimize it. Integrity and innovation are not mutually exclusive. With smart, enforceable policies, the government can ensure that OTAs truly serve the public interest and shine a light where it matters most. Only by dragging opaque consortia operations out of the shadows can OTAs fulfill their mission without compromising core values of fairness and accountability.

APPENDIX: Comprehensive OTA Consortia Table (April 2025)

The following table provides an updated list of OTA consortia sponsored by the Department of War (DoW) (former Department of Defense (DoD)) and non-DoW entities, including classifications by structural type. This table draws from publicly available sources compiled as of April 2025.

| Consortium Name | Managing Organization | Primary Focus Area | Consortium Type |
| Advanced Manufacturing, Materials, and Processes (AMMP) | National Center for Manufacturing Sciences (NCMS) | Advanced manufacturing & materials | Open-Enrollment |
| Advanced Materials Consortium (AMC) | Advanced Technology International (ATI) | Metalcasting support for DLA | Open-Enrollment |
| Forging Defense Manufacturing Consortium (FDMC) | ATI | Forging and manufacturing supply chain | Open-Enrollment |
| Center for Naval Metalworking) (CNM) | ATI | Naval metalworking innovation | Open-Enrollment |
| Composites Manufacturing Technology Center (CMTC) | ATI | Composite materials for weapons systems | Open-Enrollment |
| Naval Shipbuilding and Advanced Manufacturing Center (NSAMC) | ATI | Shipbuilding and manufacturing | Open-Enrollment |
| National Spectrum Consortium (NSC) | National Security Technology Accelerator (NSTXL) | Spectrum access, 5G, electromagnetic warfare, and wireless communications technologies for military applications | Traditional |
| Aviation and Missile Technology Consortium (AMTC) | ATI | Aviation and missile manufacturing | Open-Enrollment |
| Aviation and Missile Research, Development, and Engineering Center (AMRDEC) | U.S. Army | Aviation and guided missile R&D | Single-Manager |
| Vertical Lift Consortium (VLC) | ATI | Vertical lift technologies | Open-Enrollment |
| Propulsion Consortium Initiative (PCI) | System of Systems Security Consortium Inc. (SOSSEC Inc.) | Propulsion systems and R&D | Traditional |
| Space Enterprise Consortium (SpEC) | ATI | Facilitates the rapid prototyping and fielding of space-based technologies | Open-Enrollment |
| Consortium for Execution of Rendezvous and Servicing Operation (CONFERS) | ATI | On-orbit servicing and space economy standards | Open-Enrollment |
| University Consortium for Applied Hypersonics (UCAH) | UCAH | Hypersonics innovation and workforce development | Single-Manager |
| Consortium for Command, Control, and Communications in Cyberspace (C5) | Consortium Management Group, Inc. (CMG) | Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and cyber technology | Open-Enrollment |
| Cyberspace Operations Broad Responsive Agreement (COBRA) | SOSSEC Inc. | Cyberspace defense technologies | Traditional |
| Cyber Apex | Cyber Apex Solutions LLC | Cybersecurity for infrastructure | Single-Manager |
| Open Systems Architecture Initiative (OSAI) | SOSSEC Inc. | Open architecture C4ISR systems | Traditional |
| National Offshore Wind Consortium (Offshore Wind) | Industry-led | Renewable energy R&D | Federated |
| Defense Electronics Consortium (DEC) | U.S. Partnership for Assured Electronics (USPAE) | Defense electronics manufacturing | Unspecified |
| National Spectrum Consortium (NSC) | ATI | Electromagnetic spectrum and 5G | Traditional |
| Strategic & Spectrum Missions Advanced Resilient Trusted System (S2MARTS) | NSTXL | Spectrum and microelectronics innovation | Open-Enrollment |
| Medical CBRN Defense Consortium (MCDC) | ATI | CBRN medical countermeasures | Open-Enrollment |
| Open Systems Architecture Initiative (MTEC) | ATI | Military medical R&D | Open-Enrollment |
| Countering Weapons of Mass Destruction Consortium (CWMD) | ATI | Weapons of mass destruction defense | Open-Enrollment |
| Nano-Bio Manufacturing Consortium (NBMC) | Semiconductor Equipment and Materials International (SEMI) | Nano-bio manufacturing R&D | Open-Enrollment |
| Defense Automotive Technologies Consortium (DATC) | SAE Industry Technologies Consortia

(SAE ITC) | Military automotive technologies | Open-Enrollment |
| National Advanced Mobility Consortium (NAMC) | NAMC (self-managed) | Ground vehicle system technologies | Open-Enrollment |
| Naval Aviation Systems Consortium (NASC) | Consortium Management Group, Inc. (CMG) | Naval aviation support technologies | Federated |
| Naval Surface Technology & Innovation Consortium (NSTIC) | ATI | Naval surface innovation | Open-Enrollment |
| National Shipbuilding Research Program (NSRP) | ATI | Naval shipbuilding collaboration | Open-Enrollment |
| Undersea Technology Innovation Consortium (UTIC) | ATI | Undersea and maritime innovation | Open-Enrollment |
| Expeditionary Warfare Consortium (EWC) | Applied Research Associates (ARA) | Expeditionary warfare solutions | Open-Enrollment |
| Training and Readiness Accelerator (TReX) | NSTXL | Simulation and training technologies | Open-Enrollment |
| Sensors, Communications, and Electronics Consortium (SCEC) | SOSSEC Inc. | Sensors and electronics technologies | Open-Enrollment |
| Sensor Open Systems Architecture (SOSA) Consortium | The Open Group | Open architecture for sensor systems | Open-Enrollment |
| System of Systems Security Consortium (SOSSEC) | SOSSEC Inc. (self-managed) | Multi-domain technology integration | Open-Enrollment |
| Cornerstone OTA Consortium (Cornerstone) | Rock Island Arsenal | Integrated national security industrial base | Federated, Single-Manager |
| Govmates OTA Consortium (Govmates) | ATI | Broad-spectrum Government technology support | Open-Enrollment |
| National Center for Manufacturing Sciences (NCMS) | NCMS (self-managed) | Manufacturing competitiveness | Single-Manager, Open-Enrollment |
| National Armaments Consortium (NAC) | ATI | Armament technologies across DoW | Open-Enrollment |
| Department of Defense Ordnance Technology Consortium (DOTC) | National Armaments Consortium (NAC) in partnership with Advanced Technology International (ATI) | Ordnance systems development | Federated |
| NSTXL | NSTXL (self-managed) | Manages training, simulation, and readiness technologies (TReX), S2MARTS, and other OTA consortia | Open-Enrollment |
| Defense Innovation Unit (DIU) | DIU | Commercial tech for DoW use | Federated, Single-Manager |
| AFLCMC (Air Force Life Cycle Management Center) Consortium Initiative (ACI) | SOSSEC Inc. | AFLCMC prototyping initiatives | Open-Enrollment |
| Supply Chain Consortium Initiative (SCCI) | SOSSEC Inc. | Air Force Materiel Command (AFMC) supply chain innovation | Open-Enrollment |
| National Geospatial-Intelligence Agency OTA Consortium (NGA OTA) | SOSSEC Inc. | Geospatial technology for intelligence community | Open-Enrollment |
| Engineer Research and Development Center OTA Consortium (ERDC) | SOSSEC Inc. | Supports the U.S. Army Engineer Research and Development Center (ERDC) in: developing military engineering solutions; infrastructure resilience; environmental technologies; geospatial research; and advanced construction | Open-Enrollment |
| Future Airborne Capability Environment (FACE) Consortium | The Open Group | Open avionics standards for airborne platforms | Open-Enrollment |
| Silicon Valley Innovation Program (SVIP) | U.S. Department of Homeland Security (DHS) Science and Technology Directorate | Civilian security innovation partnerships | Federated, Single-Manager |
| Nuclear Security Science Consortium (NSSC) | National Nuclear Security Administration (NNSA) | Nuclear science education and R&D | Federated, Open-Enrollment |
| Border Security Technology Consortium (BSTC) | ATI | Border security and surveillance tech | Traditional |
| Information Warfare Research Project (IWRP) | ATI | Information warfare technologies | Open-Enrollment |
| NEST | Advanced Technology International (ATI) | Naval energetic systems and technologies | Traditional |
| Naval Energetic Systems and Technologies (NEST) Consortium | ATI | Supports the Naval Surface Warfare Center Indian Head Division (NSWC IHD) in advancing:

energetic materials and explosives; propulsion and warhead systems; safety, handling, and lifecycle management of energetics | Traditional |
| Natick Soldier Research, Development and Engineering Center (NSRDEC) | U.S. Army (U.S. Army Combat Capabilities Development Command (DEVCOM) Soldier Center) | Warfighter survivability and mobility | Federated, Single-Manager |
| SAE ITC | SAE International | Manages consortia and collaborative R&D programs on behalf of the U.S. Government | Traditional |
| Strategic & Spectrum Missions Advanced Resilient Trusted Systems Research (S2MARTS Research) | NSTXL | Microelectronics and strategic mission research | Traditional |
| Space Enterprise Consortium Research (SpEC Research) | NSTXL | Follow-on research projects for space enterprise | Traditional |


Endnotes

Named provisions

Other Transaction Authority Framework OTA Consortia Models Competition and Transparency Principles IDIQ Contract Oversight Lessons Proposed Reforms

Get daily alerts for ABA Legal News

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from ABA.

What's AI-generated?

The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.

Last updated

Classification

Agency
ABA
Published
January 1st, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor

Who this affects

Applies to
Government agencies Manufacturers
Industry sector
9261 Government Contracting
Activity scope
Government Contracting Technology Acquisition
Geographic scope
United States US

Taxonomy

Primary area
Government Contracting
Operational domain
Compliance
Topics
Artificial Intelligence Cybersecurity

Get alerts for this source

We'll email you when ABA Legal News publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.