Defense’s security clearance program falls off ‘high-risk’ list

This story has been updated.

After years of sustained progress, the Defense Department's security clearance program has been removed from the Government Accountability Office's inventory of programs and offices facing significant management challenges. But, the news was not so good for the Interior Department, whose management of oil and gas resources earned it the unenviable distinction as the only new entrant on GAO's biennial high-risk list.

The 185-page report, released on Wednesday afternoon, highlights 30 troubled programs, with most being carry-overs from previous years. Six concerns, including oversight of Pentagon and NASA contracts, have made the list every time since GAO first published it 1990.

The Pentagon significantly improved the timeliness of clearance processing, which had been frequently criticized as inefficient, GAO noted. The watchdog found Defense handled 90 percent of its initial clearances in an average of 49 days. The statutory objective is 60 days. Defense also expedited its security clearance process for contractors, moving from an average of 128 days in 2008 to 63 days in fiscal 2010, the report said.

Sen. Daniel Akaka, D-Hawaii, whose Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Federal Workforce and the District of Columbia has held seven hearings on the issue, credited the George W. Bush and Obama administrations for the enhancements.

"The progress we made on security clearances should serve as a model for future, sustained oversight efforts on other issues," Akaka said. "This will be important for addressing management challenges and making the federal government more efficient, more effective and more responsive."

The only other issue removed from the list since GAO last updated it in 2009 was planning for the 2010 census, primarily because the count has been completed and the few remaining activities remain on track.

GAO demonstrated much less faith in Interior's ability to collect its share of billions of dollars in revenue from oil and gas produced on federal lands. The report found that, particularly in the wake of last year's oil spill in the Gulf of Mexico, Interior continues to have problems hiring, training and retaining enough staff to oversee and manage oil and gas operations on federal lands and waters.

Longtime critics of Interior's former Minerals Management Service -- now the Bureau of Ocean Energy Management, Regulation and Enforcement -- said the issue should have made the list years ago.

"In 2006, the Department of the Interior's own Inspector General Earl Devaney told the oversight committee that 'short of a crime, anything goes at the highest levels of the Department of the Interior,' " said House Oversight and Government Reform Committee Chairman Rep. Darrell Issa, R-Calif. "It's better late than never, but it shouldn't have taken the worst ecological disaster in history for GAO to place this program onto the high-risk list."

In recent years, GAO has made more than 50 recommendations to address weaknesses in Interior's revenue collection, human capital policies, and practices for managing oil and gas resources. While the department has begun acting on many of those recommendations, most have yet to be implemented.

"Although oil and gas resources represent one of the largest sources of revenue for the federal government, it's far from clear that Interior has been collecting all the funds to which the American people are entitled," Comptroller General Gene Dodaro said. "I am hopeful that the addition of this area to the high-risk list will encourage the department to successfully make fundamental changes to enhance its ability to carry out its important mission."

Most of the programs GAO scrutinized demonstrated some progress during the past few years despite making the list, the report said. In three areas -- strategic human capital management, Defense's infrastructure management and the government's ability to manage its real property -- progress has been sufficient for GAO to narrow the scope of its concerns.

For example, recent telework legislation has increased the flexibility of the federal workforce to perform its mission, cutting down on human capital problems. But the report said the government still needs to close existing and emerging critical skills gaps in areas such as acquisition, foreign language capability, and oil and gas management before human capital can be removed from the list.

The Defense Department's oversight of weapons systems acquisition also took a step forward due partially to a 2009 law mandating reforms and enhanced attention from Pentagon leaders, investigators found. But, the report noted Defense "must still develop an analytical approach and empower portfolio managers to better prioritize capability needs while doing a better job of allocating resources."

Agencies also have made advancements in the oversight of food safety, recovering improper payments in the Medicare and Medicaid programs, the enforcement of tax laws, and interagency contracting, the report said.

Since 1990, GAO has designated more than 50 areas of government performance and management as high risk; the watchdog has taken one-third of those areas off the list, due to improved performance.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.