White House urged to punish GSA chief to 'fullest extent'

General Services Administration chief Lurita Doan should "be disciplined to the fullest extent" for violating the law that limits political activity in agencies, the head of the independent agency investigating the matter said in a letter to President Bush Friday.

The four-page letter, released by the Office of Special Counsel late Monday, stated that Doan also should be punished for failing to cooperate fully and honestly with OSC's investigation.

Special Counsel Scott Bloch said in the letter that the investigation concluded Doan violated the Hatch Act's prohibition against using her authority to interfere with or affect an election through her role in a Jan. 26 meeting at GSA headquarters. After a presentation by White House official Scott Jennings, Doan allegedly asked a question about helping Republican candidates, though accounts of her exact wording vary.

The letter does not address whether the presentation itself, which included a 28-slide PowerPoint presentation that analyzed the results of the 2006 midterm election, was a violation. OSC is investigating this issue separately.

A White House spokeswoman said the administration had received the OSC report and will review it internally. She did not know how long that will take.

GSA issued a statement saying, "It would be inappropriate for the administrator to comment on an official letter from the Office of Special Counsel to the President of the United States."

"Mr. President, you have much to weigh in deciding what course of action to take," Bloch wrote. "On the one hand, you have Administrator Doan's list of achievements in office and a distinguished career in the private sector. On the other, you have evidence of misconduct under the Hatch Act and, in a light most favorable to Administrator Doan, a proclivity toward misrepresentation and obstructing an official investigation. She has shown little ability to appreciate how her actions have affected the public trust or others in the administration who are watching."

The letter stated that "despite engaging in the most pernicious of political activity prohibited by the Hatch Act," Doan has failed to show any remorse or appreciation for the seriousness of the violation.

Bloch said Doan's response to OSC's report is evidence she is attempting to "minimize her illegal political activity" by arguing that her request was directed at politically appointed officials. "One may assume any such political activity likely would be in line with 'their own beliefs,'" the response stated.

In a nine-page memorandum on her response, OSC said "it is appalling" for Doan, as the highest ranking official at the agency, "to argue that her solicitation of political services was not so egregious because it was directed at her subordinate political appointees as opposed to her subordinate career civil servants."

The memo said Doan's response does not dispute any of the facts in the OSC report. Rather, the GSA chief attempted to shift the focus to the actions of others to minimize her illegal activity, OSC stated.

The OSC memo also provided more details on the discussion at the conclusion of the presentation. It stated that after Doan asked those at the meeting how the agency could help "our candidates" a GSA regional administrator spoke up and asked how the agency could get "our people" to attend a building opening event since House Speaker Nancy Pelosi, D-Calif., would be attending. Doan followed that comment by emphasizing the importance of having Sen. Mel Martinez, R-Fla., attend the opening of a federal courthouse since former President Clinton was scheduled to attend.

Following these statements, Jennings interrupted the conversation and asked for the discussion to be "taken off-line," according to OSC.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.