Interior’s reorganization after Gulf oil spill falls short

AP photo

More than two years after the 2010 Deepwater Horizon oil spill tainted the Gulf of Mexico, the Interior Department’s attempt to segregate safety monitoring from minerals management oversight in a major reorganization has produced mixed results, auditors found.

In a report on Interior’s progress released Wednesday, the Government Accountability Office pointed to missing data and an inability to gauge risk in overseeing oil and gas exploration. The department’s reorganization eliminated the Minerals Management Service after the April 20, 2010, tragedy that killed 11 people, scarred the environment over hundreds of miles and dampened local economies.

The restructuring, completed on time in October 2011, transferred MMS’ gas oil and gas revenue collection functions to a new Office of Natural Resources Revenue and then created the Bureau of Ocean Energy Management and the Bureau of Safety and Environmental Enforcement.

The GAO report, dated July 30, was addressed to Sen. Sheldon Whitehouse, D-R.I., of the Environment and Public Works Committee, and Rep. Nick J. Rahall II, D-W.Va., of the Transportation and Infrastructure Committee.

Because the three bureaus’ responsibilities for environmental analysis and reviews of permits and inspections of drilling rigs “are closely interconnected and will depend on effective coordination, Interior developed memoranda and standard operating procedures to define roles and responsibilities and facilitate and formalize coordination,” the study said.

Even though Interior’s inspections of rigs and platforms in the Gulf has uncovered numerous violations, the department’s “database is missing data on when violations were identified, as well as violation correction dates for about half the violations issued,” the auditors found. “As a result, Interior does not know on a real-time basis whether or when all violations were identified and corrected, potentially allowing unsafe conditions to continue for extended periods.”

The department’s efforts to seek input on proposed oil and gas exploration projects generally were well-received by government stakeholders, but industry and conservation groups were less satisfied, auditors found.

“Interior’s capacity to identify and evaluate risk remains limited, raising questions about the effectiveness with which it allocates its oversight resources,” GAO wrote. “Interior also continues to experience difficulties in implementing effective information technology systems, such as those that aid exploration and development plan reviews. It also continues to face workforce planning challenges, including hiring, retaining and training staff. Moreover, Interior does not have current strategic plans to guide its information technology or workforce planning efforts.”

Interior officials, after reviewing a draft of the report, generally accepted the criticisms.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.