EPA, VA clear officials who appeared in religious video

Environmental Protection Agency and Veterans Affairs Department officials who appeared alongside military officials in a 2004 video promoting an evangelical group have been cleared of potential wrongdoing, agency officials told Government Executive.

The Defense Department inspector general recently criticized seven military officials for their participation, but did not judge the involvement of EPA Administrator Stephen Johnson or Retired Vice Adm. Dan Cooper, undersecretary for benefits at VA.

"Our office did conduct an inquiry into Administrator Johnson's participation in a promotional video for Christian Embassy and found no wrongdoing," said John Manibusan, a spokesman for the EPA inspector general's office, in a statement. "Therefore, the inquiry was closed."

Manibusan declined to release any further details on the investigation, and no report on the inquiry appears on the agency's Web site.

When approached by the Defense IG's office, "we made a referral to the designated agency ethics official," said Cathy Gromek, a spokeswoman for the VA inspector general's office. "He reviewed the video, and he determined that conduct portrayed in the video did not violate federal laws or regulations."

The Defense Department's investigative branch released its own report on Aug. 3, concluding that seven Army and Air Force officers, four of them generals, acted improperly by appearing in the video in uniform and in locations within the Pentagon. Those appearances, the IG said, could be construed as meaning the Defense Department endorsed Christian Embassy, an outreach program of the evangelical group Campus Crusade for Christ ministering to Washington leaders.

The Defense auditors also said the unusual level of access given to the film crew to shoot at the Pentagon constituted an inappropriate "selective benefit."

The appearances of Johnson and Cooper in the video differed from those of the military officers. Both were identified simply as presidential appointees, and though Cooper was labeled as an "undersecretary," he was not linked to a department. Though both showed up in what appeared to be offices, the only insignia visible during their interviews was the American flag.

The differing responses to military and civilian officials' participations may also be explained by the ethics rules they are required to follow.

The EPA requires training on ethics rules -- which include some general prohibitions on providing preferential treatment to outside organizations and guidelines for acceptable fund-raising -- for some, but not all, of its employees. About 9,000 EPA employees were required to complete an hour of ethics training last year.

All Defense employees are required to complete annual ethics training. The Standards of Conduct Office has developed online training that includes a lengthy section on use of official position and promotion of nonfederal entities.

The Air Force uses a secured Web site to provide annual ethics training and certification.

In April 2005, Francis Harvey, then the secretary of the Army, mandated that all soldiers and civilian employees of the Army receive annual face-to-face ethics training. Those programs are administered by the designated agency ethics official -- currently the general counsel -- who is appointed by the secretary of the Army.

That training states that "endorsement of a private organization event, product, service may not be stated or implied by soldiers or . . . civilians in their official capacities," and reiterates that "When participating in [private organizations] or [nonfederal entities], soldiers and Army civilians must act exclusively outside the scope of their official positions."

Prohibitions on identification by title and appearing in uniform are specific to the Defense Department.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.