GAO, panel find inadequate inspection of foreign cargo

The Homeland Security Department is not adequately inspecting cargo and containers headed for the United States from foreign seaports, according to Government Accountability Office findings released Wednesday and a separate Senate panel investigation.

Two GAO reports and a 20-month congressional investigation into the department's efforts to secure cargo and containers found that it is inspecting less than 1 percent of containers overseas and 17.5 percent of high-risk cargo.

Also, the department has certified importers for expedited inspections without a thorough validation of their supply chain security. And technology to screen cargo and containers at ports overseas are "untested" and of "unknown quality," said the panel in a release announcing the findings.

"Ensuring the security of our global supply chain is critical to homeland security since maritime trade accounts for over 25 percent of the U.S. [gross domestic product] and many experts believe that terrorists are likely to exploit the inherent vulnerabilities of the global supply chain for their nefarious purposes," said Sen. Norm Coleman, R-Minn., who chairs the Senate Homeland Security and Governmental Affairs Investigations Subcommittee, which conducted the investigation.

The GAO, U.S. Customs Commissioner Robert Bonner and former Homeland Security officials are slated to testify Thursday about the issue before the subcommittee.

After the Sept. 11, 2001, terrorist attacks, the department started two international programs to secure shipments entering the country without adversely affecting the flow of commerce.

Companies belonging to the Customs-Trade Partnership Against Terrorism program voluntarily work with the department to bolster security of their goods in exchange for expedited inspections. C-TPAT importers are seven times less likely to undergo inspections of their cargo, according to a release by the subcommittee.

The second program, Container Security Initiative, enables U.S. officials to inspect high-risk containers at foreign ports before the ship departs for U.S. ports. The officials have deployed detection equipment in 36 foreign ports, but GAO found the department has "limited assurance that the equipment in use can successfully detect all" weapons of mass destruction.

House Energy and Commerce ranking member John Dingell, D-Mich., Wednesday criticized the department for failing to meet expectations.

"The commissioner of Customs has assured us repeatedly that they have in place a 'layer-in-depth' system to protect the nation from terrorists using shipping containers to smuggle WMDs into the U.S." Dingell said. "Yet each time we peel back a layer we find there is less than promised."

The GAO recommended the department bolster its process for validating importers by establishing performance measures, goals and adequate internal controls to manage the program. For the container security program, the GAO recommended the department draft technical requirements for the detection equipment overseas.

The Investigations Subcommittee plans to hold follow-up hearings this fall to review the department's progress in implementing GAO's recommendations.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.