Coast Guard must ramp up security, acquisition efforts, senators say

The Coast Guard should accelerate efforts to protect U.S. seaports from terrorism and move ahead on its $11 billion Deepwater acquisition project, senators from coastal states said Wednesday.

Sen. Olympia Snowe, R-Maine, called on the Coast Guard to speed up security assessments of seaports and said she would try to increase funding for Deepwater, the service's 30-year upgrade of its offshore fleet, so the project could be finished in 10 years.

"I think we clearly have to place this on an accelerated timetable," Snowe told Coast Guard Commandant Thomas Collins at a hearing of the Senate Commerce Subcommittee on Oceans, Atmosphere and Fisheries, which she chairs. Collins said he was pleased with the administration's fiscal 2004 budget request of $500 million for Deepwater, and said the program could adapt to fluctuations in funding.

"That's a lot of money by Coast Guard standards," he said.

Collins also sought to assure senators that recent Coast Guard deployments to the Persian Gulf have not hurt the service's ability to protect the nation's 361 domestic seaports. Eight 110-foot patrol boats and four port security units have been sent to the Gulf as part of the U.S. military buildup in the Middle East. But the service can tap 11 Navy ships to help with port security and increase the missions of other Coast Guard fleets to replace ships sent overseas, according to Collins.

"It's a quid pro quo with the Navy in sharing assets to do the nation's bidding," said Collins.

Nevertheless, several senators expressed concern that the Coast Guard lacks the resources to adequately protect U.S. seaports. Just last week, four armed members of the Cuban border patrol docked in Key West, Fla., and walked into town before they were stopped. The four men, who were attempting to defect to the United States, evaded a Coast Guard patrol, Collins said.

Senators also worried that the Coast Guard's pace for grading the vulnerability of U.S. seaports is too slow, given heightened terrorism concerns. The service plans to evaluate 55 ports within five years and has finished 15 vulnerability assessments so far, Collins said. The Coast Guard has tapped defense contractor TRW to perform the security assessments.

The Coast Guard's move from the Transportation Department to the new Homeland Security Department also presents management challenges, JayEtta Hecker, director of physical infrastructure at the General Accounting Office, said at the hearing. Hecker urged the Coast Guard to set performance measures for port security and its other homeland security missions, which now absorb just under half of all Coast Guard resources, according to Collins.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.