Obama asks Hill for $600 million border security amendment

The White House on Tuesday sent Congress a detailed breakdown of how it wants to spend $600 million in emergency funds for border security, which would be partially offset by eliminating $100 million from the problem-plagued virtual fencing program.

The money would go to the Homeland Security Department and Justice Department, including $297 million to hire 1,000 new Border Patrol agents and $37 million to buy and operate two new unmanned drones along the Southwest border.

Other funds would support new investigative and SWAT teams along the border, as well as prosecutors and prisons.

"This request responds to urgent and essential needs," President Obama wrote in a letter to House Speaker Rep. Nancy Pelosi, D-Calif. "Therefore, I request these proposals be considered as emergency requirements."

The request appears to mark a change in how Obama views problems along the Southwest border. His fiscal 2011 budget request for the Homeland Security Department, for example, proposed to eliminate 181 Border Patrol positions.

Obama announced his intent to seek the funding last month after it became clear that House lawmakers planned to include border security money in the supplemental spending bill for the wars in Iraq and Afghanistan. The bill may be brought to the floor this week.

Now the question is whether lawmakers will allocate the funding the way the administration wants.

House Homeland Security Appropriations Subcommittee Chairman David Price, D-N.C., "appreciates the White House's input," according to his spokesman.

"He may have some differences with some of the specifics of the request, but he looks forward to working with the president to most effectively enhance border security," the spokesman added.

House Homeland Security Border Subcommittee Chairman Henry Cuellar, D-Texas, said "the president's framework matches our vision in Congress to provide critical additions along the southern border in the face of escalated violence in Mexico."

"Ultimately, Congress will decide how to appropriate such funds based on the president's request. I will continue to stand by this and other emergency funding for our southern border," he added.

Overall, the White House is seeking $399 million for the Homeland Security Department and $201 million for the Justice Department.

The request includes $52.5 million to hire 160 new Immigration and Customs Enforcement investigators; $29.7 million for the U.S. Marshals Service; $20 million for the federal prison system; $9.2 million for U.S. attorney salaries and expenses; and $6.5 million to hire 30 new Customs and Border Protection officers.

Notably, the White House is seeking $25.3 million to establish five new FBI investigation teams, including "wiretapping and fingerprint capture equipment," according to the request.

An additional $21 million is being sought for the "immediate and temporary deployment of additional federal law enforcement agents and prosecutors to the Southwest border region to help address violence and criminal activity."

Most of the proposed spending would not be offset and therefore would increase the top-line funding within the president's fiscal 2010 budget. But the administration proposes to eliminate $100 million from the SBInet virtual fence program to help cover some of the costs.

The White House noted that funding for the SBInet program has been frozen pending a review of its effectiveness.

Senate Democrats have not yet said whether they support adding border security funds to the supplemental spending bill. Indeed, Democrats beat back Republican efforts to add more than $3 billion in border security funding when the supplemental was on the floor.

But Senate Democratic leaders have indicated they could support adding the $600 million sought by the White House.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.