Defense faces lawsuit from sexual assault victims

Defense Department

The Defense Department is under fire this week, with several sources alleging its failure to address sexual assault, hazing and its lack of diversity.

Eight women -- seven veterans and one current service member -- filed a lawsuit Tuesday against current and former military leaders, the Associated Press reported.

Seven of the women said a comrade raped or attempted to sexually assault them during their service in the Navy or Marine Corps, while one woman said during her deployment to Iraq she suffered harassment and threats. Several said they had a superior dismiss their complaints, or they suffered retaliation after coming forward.

The suit, filed with the U.S. District Court for the District of Columbia, says the Defense Department has not done enough to tackle the problem of sexual assault and has created a hostile environment that discourages sexual assault victims from reporting incidents and punishes those who do.

"This is the year 2012. This kind of conduct is not acceptable,” said Susan Burke, a lawyer representing the eight women.

In an attempt to address such problems, Defense earlier this year introduced several initiatives, including one for implementing a sexual assault advocate certification program and another requiring victim advocates and response coordinators at the department to obtain credentials that meet national standards.

After a December 2011 report found a sharply higher number of sexual assaults at military academies, Defense announced two policy changes to allow victims of sexual assault to request an expedited transfer from their unit or installation, and to standardize the retention period for sexual assault records and make them available to victims.

Cynthia Smith, a Defense spokeswoman, reiterated these recent measures and said that the department has a zero-tolerance policy, but she could not comment on the suit.

"It is important that everyone in uniform be alert to the problem and have the leadership training to help prevent these crimes," she said in a statement.

Congress, meanwhile, is calling into question Defense’s efforts to prevent harassment and increase diversity, The Washington Post reported.

At a joint-congressional forum on Tuesday, lawmakers questioned Defense leaders on their lack of progress in implementing the recommendations of the Military Leadership Diversity Commission, which found that minorities are underrepresented in armed forces leadership. Rep. Elijah Cummings, D-Md., noted the services have more than half the recommendations still under review. “It sounds like there’s been a lot of talk, but not enough action,” he said.

Rep. Judy Chu, D-Calif., angrily confronted Defense leaders for failing to take harassment and hazing seriously and stated the services do not punish violators adequately.

Chu’s nephew, Marine Lance Cpl. Harry Lew, committed suicide in Afghanistan in April after alleged physical harassment from his fellow Marines.

“Any claims that hazing incidents are isolated are unfounded,” Chu said.

Clarence Johnson, director of the Defense Department’s Office of Diversity Management and Equal Opportunity, told lawmakers the Pentagon is doing its best to combat hazing.

“The department’s policy prohibiting hazing is unambiguous,” Johnson said. “It is contrary to good order and discipline and is unacceptable behavior.”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.