Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Managing Oversight


Congressional oversight of intelligence is broken. That was the dismal conclusion of a 2006 report by the Center for American Progress, as well as the bipartisan 9/11 commission, both of which scoured the histories of congressional watchdogging -- real and imagined -- and concluded that the system set up to guard against abuses and keep intelligence in line with U.S. policies was not working the way it was intended.

What was the problem? It boiled down to this, the center's report said: Congress had all the tools it needed to conduct real oversight, but wasn't using them. That's because the committees themselves fractured along party lines. From the mid-1970s to the late 1990s, congressional oversight was, if not entirely consistent, consistently bipartisan. There were notable exceptions, but generally, members believed they had a special role to play in foreign policy, and they made an effort to become more informed about intelligence, both in terms of specific operations and the discipline as a whole.

That all went sideways with the past decade's rise in partisan rancor. No one will be surprised to know it has infected the intelligence committees. The latest evidence was on display in May when House Speaker Nancy Pelosi accused the CIA of having lied to her about interrogation of terrorist suspects.

Democrats rallied around the speaker, Republicans rallied around the legacy of George W. Bush. And rather than argue about how well they'd actually managed their oversight responsibilities, the lawmakers questioned each other's honesty, integrity and willingness to defend the nation from evil.

As the committees have become more partisan, they've also become less informed about intelligence. The center's report cites a number of historians and former staffers who regret that lawmakers spend much of their time bickering over authorizations for individual programs, using the power of the purse for tactical political advantage. That has left less time to devote to the overall mission of the intelligence community and to strategy. Back in the 1980s, intelligence committees acted as a sounding board for intelligence operations, a kind of council of political elders who were concerned about how agencies carried out their missions. That required a level of trust among the members, and while it was never ironclad, it has dissolved.

Oversight today bears a striking resemblance to the 1950s. In the CIA's early days, there were no intelligence committees per se. A small number of senators and congressmen on the appropriations and armed services committees formed an exclusive club, and for two decades, their oversight was known more for its deference to the CIA director than its skepticism of him. Once, in 1973, Senate Armed Services Committee Chairman John Stennis told CIA Director James Schlesinger, who wanted to brief him on an upcoming operation, "Just go ahead and do it, but I don't want to know."

What most historians recognize as meaningful oversight began in the mid-1970s, after revelations of foreign policy fiascoes and domestic intelligence abuses. That seems to be the model that many would like to recapture. Their prescription is this: stronger management. The center's report urged committee staff to conduct more investigations and field studies, and to communicate more with agency personnel. In other words, they should do the job they're allowed, and required, to do by law. The 9/11 commission offered a different, hugely controversial recommendation: Form a single joint committee, and eliminate term limits on membership so Congress could develop a seasoned, knowledgeable base of overseers.

The commission was less than optimistic about the chances of that happening, noting, "Few things are more difficult to change in Washington than congressional committee jurisdiction and prerogatives." Recent events remind us how true that is.

Shane Harris, a staff correspondent for National Journal, wrote about intelligence and technology at Government Executive for five years.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.