Government overcomes security clearance backlog

Comptroller General Eugene Dodaro emphasized that removal from the High-Risk List “doesn’t mean we don’t have a watchful eye on this going forward.” Comptroller General Eugene Dodaro emphasized that removal from the High-Risk List “doesn’t mean we don’t have a watchful eye on this going forward.” Alex Brandon/AP
The Obama administration has made noticeable strides in streamlining security clearance, according to auditors and officials.

Initial investigations take an average of 44 days to complete, down from 189 days in 2005, and the application backlog has been eliminated, according to Sen. Daniel Akaka, D-Hawaii, who spoke at a hearing Thursday.

In 2011, the Government Accountability Office removed the process from its high-risk list, where it had been sitting since 2005.

“I think the overarching framework has worked very well,” said Office of Management and Budget Controller Danny Werfel.

Because the Defense Department handles the majority of government security clearances, it has shouldered the brunt of criticism about application backlogs. In his testimony, Government Accountability Office Comptroller General Gene Dodaro praised Defense and the agencies it has collaborated with for establishing metrics to assess various aspects of clearances.

Dodaro emphasized, however, that removal from the high-risk list “doesn’t mean we don’t have a watchful eye on this going forward.”

In her testimony, Defense Deputy Chief Management Officer Elizabeth McGrath emphasized the department’s key efforts in reducing clearance time, including establishing the Performance Accountability Council with OMB, the Office of Personnel Management and the Office of the Director of National Intelligence.

The council, McGrath said in her opening statement, has standardized the investigation and adjudication procedures, and Defense now can adjudicate a clearance in seven days.

Charlie Sowell, deputy assistant director for special security with ODNI, said 22 agencies met their timeliness goals for 2011, while 19 reached their goals at times and five did not meet any of their goals.

Akaka led the hearing, the eighth on the subject and the last that will be held under his tenure. Akaka, chairman of the Homeland Security Subcommittee on Oversight of Government Management, the Federal Workforce and the District of Columbia, previously announced that he will not run for reelection in November.

In 2010, Akaka urged agencies to improve reciprocity by working together to accept clearances from other agencies. To that end, ODNI has established a reciprocity Web page where individuals can submit clearance issues directly to an agency, though Sowell noted it is difficult to measure reciprocity without real data.

Dodaro and GAO asked agencies to identify long-term funding requirements for keeping security clearances at a manageable length.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.