GSA's Doan done in by battling White House

General Services Administration chief Lurita Doan was fired Tuesday almost a year after her actions drew heavy criticism from Capitol Hill Democrats, but her ouster was triggered by more recent friction with the White House, officials briefed on the matter said.

According to House Oversight and Government Reform ranking member Tom Davis, the headstrong administrator angered White House officials by refusing to abide by their wishes on several matters, including her recent rejection of suggested political appointees to fill senior-level vacancies at GSA.

"That seems to be the straw that broke that camel's back," said Davis, citing a conversation with White House officials regarding Doan's ouster.

"At the end of the day it was that kind of thing," added Davis, who has been a staunch backer of Doan and who criticized her removal.

According to Davis and GSA officials, Doan rejected a series of White House candidates for the jobs of GSA general counsel and chief acquisition officer. Both posts, while recently filled by political appointees, are held by career civil servants serving in an acting capacity.

A senior House aide said Doan, who joined the agency after success as an entrepreneur and founder of a technology firm, appeared to misstep when she attacked Kenneth Kaiser, chairman of the President's Council on Integrity and Efficiency's Integrity Committee and assistant director of the FBI's criminal division.

Doan repeatedly criticized Kaiser after he dismissed whistle-blower complaints against GSA Inspector General Brian Miller, with whom Doan has battled for nearly two years.

In a letter to Kaiser, Doan called the council "a hollow shell . . . that exists only as a fig leaf to provide the illusion of oversight over IG misconduct, but, in fact, its real purpose is to whitewash any wrongdoing, avoid responsible action and ensure a blind eye to IG misconduct," Government Executive reported last month.

In attacking the council and vowing to continue her feud with Miller, Doan butted heads with Office of Management and Budget Deputy Director Clay Johnson, who is the titular chairman of the council and longtime associate of President Bush, the aide said. Sources said Doan has long been at odds with Johnson and has refused to attend a regular meeting he convenes.

Such battles apparently lost Doan the White House backing that allowed her to survive blistering attacks last year by House Oversight and Government Reform Chairman Henry Waxman, congressional Democrats and others.

The independent Office of Special Counsel, in a report in June, recommended President Bush remove Doan for violating the Hatch Act, which bars use of federal resources for partisan politics. Democrats in the House and Senate called for her resignation.

Though the White House publicly refused to address the attacks and Bush took no action, Doan was privately warned to avoid controversies, sources said.

Davis said Doan's recent clashes with the White House led officials there to conclude that she was not worth keeping on as head of what they consider a "third-tier" agency.

"She's too temperamental," Davis said, summarizing the White House view.

Davis said he had warned Doan unsuccessfully not to fight the White House over the general counsel position.

But late Tuesday afternoon, Doan was summoned to the White House, where she was asked to resign her post, sources said.

The White House and OMB declined to respond to questions Thursday about the reason for Doan's ouster.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.