Senators demand a better plan for nuclear detection

Senators on Wednesday blasted a nuclear detection unit for failing to develop a strategic plan, and asked officials to produce one as soon as possible.

The Homeland Security Department has spent nearly $4 billion on aspects of a system to find illicit radiological and nuclear materials, but has yet to complete a comprehensive strategy for the project, the Government Accountability Office testified during a Senate Homeland Security and Governmental Affairs Committee hearing.

DHS Deputy Secretary Jane Holl Lute told lawmakers the department's Domestic Nuclear Detection Office is working on a draft document, to be published before the end of the calendar year. But Dec. 31 won't be soon enough, said committee Chairman Joseph Lieberman, I-Conn., and ranking member Susan Collins, R-Maine.

"We cannot wait another eight years, or even eight months," Collins told Lute. November would be a good target, said Lieberman, adding it would be "encouraging" if DNDO published the plan sooner than expected.

Lieberman and Collins also said DNDO has little to show for hundreds of millions of dollars spent on two projects originally expected to produce the next generation of radiation detection technology: the advanced spectroscopic portal and the cargo advanced automated radiography system. The advanced spectroscopic portal now is considered to be a possible tool only for secondary scanning. And in 2007, the office scrapped acquisition and deployment plans for CAARS machines.

The CAARS project was cut short when Border Patrol agents told DNDO acquisition officials the technology was too big for primary inspection lanes and would only cause delays in the flow of commerce. Asked why Homeland Security spent millions of dollars on technology that was operationally flawed, Lute responded, "It's inexcusable."

"What I can tell you, senator, is that we have fixed that problem," she said. "We have established an acquisition system that fully integrates the needs of the operators with the acquisition system itself. We have introduced points along that system for active engagement and oversight. We have introduced an operation testing phase as well, and that's a field testing phase to prevent these things from happening."

Furthermore, the senators questioned Lute on a GAO charge that funding requests for the cargo advanced automated radiography system did not truthfully reflect the status of the program. The office's budgetary justifications for fiscal 2010 and fiscal 2011 included an ongoing CAARS testing campaign that was to produce a cost-benefit analysis. But DNDO officials acknowledged to GAO that in canceling the acquisition part of the program in 2007, they also put an end to plans to conduct a cost-benefit analysis.

"At a time when we are scrutinizing the budget, squeezing every dollar, if we can't rely on the credibility of the information provided by the department for a program that nearly three years ago was abandoned, that's very serious," Collins said.

Lieberman and Collins asked Lute to respond in writing to GAO's allegations concerning the questionable budgetary justifications.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.