FBI probing death threats, vandalism against lawmakers

The FBI, Capitol Police and local law-enforcement agencies said Wednesday they are investigating death threats, vandalism and other acts against Democratic House members in the wake of Sunday's passage of the healthcare overhaul bill.

The incidents include faxed messages to House Majority Whip Clyburn and Rep. Bart Stupak, D-Mich., that included depictions of a hangman's noose. One fax sent to Clyburn's district office in South Carolina included the misspelled word "n----r," while one to Stupak called him a "baby-killing [expletive]" and another he received directed a racial taunt at President Obama.

Other incidents tied to the vote include a voicemail left at the western New York campaign office of House Rules Chairwoman Louise Slaughter that mentioned snipers and a window at her district office that was broken by a brick; the shattering of a door at the Tucson office of Rep. Gabrielle Giffords, D-Ariz., and the cutting of a gas line at the Charlottesville, Va., home of the brother of Rep. Tom Perriello, D-Va., after critics of the legislation publicized the address.

"This stuff is beyond the pale," said Clyburn, who added that he would not be intimidated.

Stupak, who decided to support the health bill after Obama said he would issue an executive order dealing with a prohibition of abortion funding, said some of the threats he received "are real cause to worry."

Slaughter called the events in her district "very distressing," but said, "it's more disturbing to me that Republican leadership has not condemned these attacks and appears to be fanning the flames with coded rhetoric."

She pointed to Republican National Committee Chairman Michael Steele's claims that Speaker Nancy Pelosi should be "on the firing line," and former GOP vice presidential nominee Sarah Palin's depiction of some House Democratic members' districts in the crosshairs of a rifle scope.

Slaughter noted that the threats and vandalism followed protesters hurling racial slurs and obscenities at Democratic lawmakers outside the Capitol last weekend, and some Republican House members taking to the balcony outside the Speaker's lobby to seemingly encourage the protesters.

Clyburn, too, said Republican lawmakers shared the blame.

"People out there in the streets get their signals or what they think are their signals from the people in positions like we hold and so if we don't disown that and go get our people to move beyond that, if we participate in it, either from the balcony or on the floor of the House, you are aiding and abetting this kind of behavior," Clyburn said on MSNBC.

House Minority Leader John Boehner, who delivered an angry denunciation of the bill before the final vote Sunday night, appealed for calm.

"Violence and threats are unacceptable," he said. "That's not the American way. We need to take that anger and channel it into positive change. Call your congressman, go out and register people to vote, go volunteer on a political campaign, make your voice heard -- but let's do it the right way."

House Majority Leader Steny Hoyer said more than 10 incidents had been cataloged. He spoke after a closed-door meeting at the Capitol that included members of the Democratic Caucus with Shawn Henry, the FBI special agent in charge of the Washington field office, Timothy Durand of the FBI Violent Crimes Task Force, Capitol Police Chief Phillip Morse Sr., and House Sergeant at Arms Bill Livingood.

After the meeting, the FBI released a statement confirming its involvement in the investigation of some of the incidents.

"All threats and incidents directed against members of Congress are taken seriously and are being investigated by the FBI, U.S. Capitol Police and other law enforcement agencies to identify and bring to justice those responsible," the agency said in the statement.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.