Scandal Politics

Are lawmakers better at dishing out accountability than taking it?

Two former U.S. representatives were locked up in federal prisons in the last 18 months for corruption. Rep. Randy "Duke" Cunningham, R-Calif., is serving eight years for getting defense work for contractors in return for bribes and favors. Rep. Bob Ney, R-Ohio, is serving a 30-month sentence after taking bribes related to his official work in Congress. Ney was caught in an investigation of lobbyist Jack Abramoff, who also is in prison. Former Office of Management and Budget and General Services Administration official, David Safavian, also was caught in that investigation and was sentenced last year to 18 months in prison.

The Cunningham and Ney cases-along with continuing investigations into the activities of various Republicans and Democrats in both the House and Senate-helped spur Congress this year to approve a sweeping ethics and lobbying reform bill that places stricter limits on the conduct of Senate and House members, their staffers, and executive branch appointees. President Bush signed the bill into law on Sept. 14.

Ethics was one of the issues Democrats highlighted in their 2006 election campaigns, helping the party take over Congress for the first time in 12 years. Ney's former seat went to a Democrat, as did the seat of former Rep. Tom DeLay, R-Texas, who saw two of his former staffers plead guilty in the Abramoff investigation. House Speaker Nancy Pelosi, D-Calif., made ethics legislation the first order of business in the new Congress in January.

But even though it was scandals involving House members and staffers that made the legislation such a high priority, a key part of the new law places tougher restrictions on everybody but those two groups. That part governs the cooling-off period for officials leaving government service, requiring them to wait before lobbying their former colleagues. Cooling-off periods limit the pull of the revolving door between government jobs and more lucrative positions in the private sector that take advantage of officials' connections in government.

Under previous law, the cooling-off period for most officials in both the legislative and executive branches was one year. Under the new law, the duration for senators and senior executive branch appointees-Cabinet secretaries, the vice president and top White House staff-is two years. But for House members and Capitol Hill staffers, it's still one year. President Bush noted the discrepancy when he signed the bill. "The bill holds members of the Senate and executive branch employees to a much higher standard of conduct than members of the House," Bush said.

This, it turns out, is not a new fight. In 1988, President Ronald Reagan vetoed a bill that the House passed, imposing a two-year cooling-off period on executive branch employees but only one year on members of Congress. "In future consideration of post-employment restrictions legislation, the Congress should determine what restrictions are reasonable and necessary to protect the integrity of government and then apply them equally to both the Congress and the executive branch," Reagan wrote in his veto message. Legislation finally signed into law a year later set a standard one-year cooling-off period for everyone.

Bush suggested in his signing statement that a standard rule should be applied in the future. But for now, members of the House have decided a higher standard is necessary for others, but not themselves.

Brian Friel covered management and human resources at Government Executive for six years and is now a National Journal staff correspondent.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.