Problems remain in Homeland Security oversight

Congress' failure to act on the 9/11 Commission's recommendation to reform and sharply simplify the overlapping maze of 17 congressional committees claiming jurisdiction over homeland security is the biggest problem remaining since the Sept. 11, 2001, terrorist attacks, the co-chairmen of the panel said Tuesday.

Former New Jersey Gov. Tom Kean and former Rep. Lee Hamilton, D-Ind., testified before the Senate Homeland Security and Governmental Affairs Committee that while the nation's defenses have improved, the Christmas bombing attempt on a Detroit-bound airliner showed that a lot more needs to be done.

"Enduring fractured and overlapping committee jurisdiction on both sides of the Hill have left congressional oversight in an unsatisfactory state," Kean and Hamilton said in their joint statement.

That complaint was quickly embraced by Senate Homeland Security and Governmental Affairs Chairman Joe Lieberman and ranking member Susan Collins. "The one institution Congress is less willing to reform is Congress itself," Lieberman said. "There is no excuse for that, except turf protection."

Other weaknesses cited by Kean and Hamilton were the lack of analysis of the intelligence pointing to the alleged terrorist and ambiguities in the intelligence reform law over the director of national intelligence's absolute authority over the array of intelligence organizations. They attributed that latter flaw to the lack of strong leadership by President Obama.

Kean and Hamilton also shared the "outrage" expressed by the committee leaders and Sen. John McCain, R-Ariz., that no one in the national intelligence leadership was consulted before the Justice Department decided to handle the alleged bomber, Umar Farouk Abdulmutallab, as a criminal rather than as a prisoner of war who could have been interrogated for information on other terrorist plots.

"I was shocked," Kean said. "Decisions of this kind should never be made without consulting the top intelligence officials."

Hamilton said what bothered him the most was the fact that there was no clear policy in place on how to handle the suspect.

Asked how Obama was dealing with these issues, Hamilton said he did not think the president "has a firm grasp of intelligence. ... He has to step in harder" or the current lack of clarity on the DNI's authority over the intelligence community would get worse.

"We've always thought the success of the DNI depends on leadership of the president," Kean said.

Kean and Hamilton co-chair the Bipartisan Policy Center's National Security Preparedness Group.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.