Homeland Security panel sets priorities, stirring GOP discontent

Senior lawmakers on the House Homeland Security Committee Wednesday pledged to complete an authorization bill for the Homeland Security Department in the spring and said the panel will conduct oversight on President Obama's plan to close the military detention facility at Guantanamo Bay, Cuba.

"What you can anticipate from us is an authorization bill," Homeland Security Committee Chairman Bennie Thompson, D-Miss., said after the committee's organizational meeting. "Our goal is probably by May 1, something like that, to have a bill done." But, he added, "That could slip based on the legislative calendar."

Republicans want the bill to be done before appropriators set about completing the annual Homeland Security spending bill. They argue that the authorization bill would give direction to appropriators.

Thompson also said the committee will produce a chemical-plant security bill, but he did not provide a time frame for doing so. Homeland Security ranking member Peter King, R-N.Y., said he wants the committee to examine the impact of Obama's policies, including the Guantanamo closure and new rules for detainee interrogations.

"Will that have an impact as far as homeland security?" King asked. "That's an added element."

Thompson said he has instructed committee staff to put together a congressional delegation to visit Guantanamo "to look at what's there, what challenges presently exist, what challenges to the homeland potentially exist with those individuals being housed on the mainland."

The committee adopted its oversight work plan for the year Wednesday, although it is not clear if the plan will be made public. Nonetheless, Republicans complained that the Democratic-drafted plan is void of critical oversight language.

"It appears that on the oversight, we're taking out areas, which could be surrendering jurisdiction," said King, referring to issues Democrats have chosen not to address.

"I know that the committee has the right to go in there anyway, but by taking the language out I think it weakened our position," said Border Subcommittee ranking member Mark Souder, R-Ind. He said this year's oversight plan, compared to last year's, left out language on securing the border, the Coast Guard, dismantling terrorist financing networks and information sharing.

Border Subcommittee Chairwoman Loretta Sanchez, D-Calif., countered, "Just because we don't have it in this work plan doesn't mean we aren't going to get some of this done."

Democrats and Republicans alike complained -- for another year -- that the committee does not have complete jurisdiction over the Homeland Security Department. Republicans argue that Democrats are not doing enough to fight to consolidate the committee's jurisdiction.

Thompson said he agreed "there's no question that jurisdiction remains a significant challenge for the committee." But he said he succeeded in getting the Democratic Caucus to adopt rules ensuring that more bills will be referred to the committee.

"To say that we got everything we wanted would not be correct," he acknowledged. "But it was my effort to move the issue forward. It was my effort to bring the challenge that we have as a committee to leadership. And we're working it. And I think you will see more bills referred to the committee because of our work."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.