Homeland Security, Democrats spar over protection efforts

The Homeland Security Department on Friday disputed a report issued by House Democrats that included sweeping criticisms of efforts to protect the country.

Democratic members of the House Homeland Security Committee released initial findings of an upcoming report alleging gaps in the areas of intelligence, nuclear material stockpiles, aviation security, border security, port security, critical infrastructure protection, chemical plant security, cybersecurity, bioterrorism, first responder preparedness, civil rights protection and information technology.

"The reality is that anybody who looks at homeland security today in an objective way will acknowledge that we have serious security gaps that remain, and the task is to close those gaps in the shortest amount of time possible," committee ranking member Rep. Jim Turner, D-Texas, said Friday.

But DHS spokesman Brian Roehrkasse said the report "completely fails to recognize the significant accomplishments" the department has made in protecting the country. Roehrkasse said some of the conclusions in the report are inaccurate, while others contradict priorities set by Congress through legislation.

For example, the report states that DHS has not yet implemented a new immigration tracking system at U.S. land ports, where 80 percent of all inspections take place. But Roehrkasse noted that Congress does not require that capability until the end of 2005.

The report puts DHS officials at odds with committee Democrats less than one week before Congress reconvenes and the committee tackles the daunting tasks of passing homeland security legislation and drafting the first DHS authorization bill.

Turner said one of the biggest problems for homeland security efforts is the lack of a comprehensive terrorist threat and vulnerability assessment of the nation's critical infrastructure. The DHS Information Analysis and Infrastructure Protection Directorate is responsible for completing the assessment.

According to the report, the directorate has hired only 36 percent of authorized employees, adding that the directorate's assistant secretary, Robert Liscouski, said a comprehensive assessment is unlikely to be completed within the next five years.

Roehrkasse refuted those claims, saying the directorate has hired up to 50 percent of authorized employees. He said the department has developed an action plan to conduct vulnerability assessments, and is currently assessing chemical facilities and issuing recommendations that, in some cases, go beyond what is required in legislation. Roehrkasse added that the nation has hundreds of thousands of pieces of critical infrastructure, most of which are owned and operated by the private sector.

"This seems to demonstrate a fundamental misunderstanding and unrealistic expectations for a department that is less than a year old," Roehrkasse said.

According to Turner, a comprehensive vulnerability assessment is needed to determine homeland security priorities, including how much funding is required, where investments are best suited and whether the government should offer industry incentives to better protect infrastructure. He said the committee might consider incentives for the private sector that include tax deductions, tax credits and shortened capital depreciation times.

"There is always a struggle between how much regulation the government should place on the private sector," he said.

Turner said the final report would be issued before DHS celebrates its one-year anniversary in March. He added that committee Democrats plan to use the findings in the report as a guide to crafting the DHS authorization bill.

Homeland Security Committee Republicans also took issue with the findings Friday. Committee Chairman Christopher Cox, R-Calif., criticized the report, saying minority members are "substituting rhetoric for responsible oversight."

"The committee majority will work closely with the minority and with the Department of Homeland Security on constructive solutions to the many challenges that remain," Cox said. "But backsliding from responsible oversight into one-page summaries of major initiatives and a laundry list of homeland security gaps is unacceptable amateurism."

Turner said he hopes DHS will view the report as "a legitimate exercise of congressional oversight."

"I think the task here is to maintain a sense of urgency and strength of leadership that's necessary to unite the American people behind the task of securing the homeland," he said. "What we see from our vantage point on the committee are significant security gaps that still represent a threat to the American people."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.