GOP lawmaker plans to move forward with Holder contempt vote

Rep. Darrell Issa, R-Calif. Rep. Darrell Issa, R-Calif. J. Scott Applewhite/AP
House Republicans plan to press on with consideration Wednesday by the Oversight and Government Reform Committee of a vote to hold Attorney General Eric Holder in contempt of Congress regarding a stand-off over documents tied to the botched "Fast and Furious" sting operation.

The announcement Tuesday night by committee chairman Darrell Issa, R-Calif., followed a closed-door meeting at the Capitol between Issa and other Republican and Democratic lawmakers with Holder at the U.S. Capitol. Issa described himself as disappointed and still hoping for a breakthrough.

"I had hoped that after this evening's meeting I would be able to tell you that the Department had delivered documents that would justify the postponement of tomorrow's vote on contempt," said Issa, in a statement.

Issa claimed the Justice Department had told the Committee last Thursday that it had documents it could produce that would answer our questions.

Holder, speaking in the Capitol Rotunda to reporters, said he had come "in good faith" and that he had made a number of documents, specifically those from February to December of 2011, available.

Asked if he thought he and his department could avoid the contempt vote, Holder said, "The ball's in their court."

But Issa said, "Today, the Attorney General informed us that the Department would not be producing those documents. The only offer they made involved us ending our investigation."

"While I still hope the Department will reconsider its decision so tomorrow's vote can be postponed, after this meeting I cannot say that I am optimistic. At this point, we simply do not have the documents we have repeatedly said we need to justify the postponement of a contempt vote in committee," said Issa.

Under the "Fast and Furious" operation, the Bureau of Alcohol, Tobacco and Firearms sold thousands of weapons to gun traffickers with the intention of then tracing those guns to Mexican drug cartels. But the operation went sour when the ATF lost track of many of the weapons, including ones later linked to the killings of Border Patrol agent Brian Terry and as many as 300 Mexicans.

For more than a year, Issa has been leading a congressional investigation into failed gun-trafficking operation. Late last year, he issued a subpoena to Holder seeking communications regarding the operation from top Justice officials, documents and information shared with the White House and relating to the death of Terry and others, and any efforts to keep some information covered-up.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.