Senior DHS Officials Improperly Appointed

Senior DHS Officials Improperly Appointed

The Government Accounting Office (GAO) is now saying that acting DHS Chad Wolf and his active deputy, Ken Cuccinelli are ineligible to govern the agency to which they were appointed by the Trump administration. The non-partisan watchdog agency cited the Vacancy Reform Act.

Both men are acting officials, neither has senate approval. Presently, it is not clear how this presidential appointment might affect their ability to run the agency. DHS is clearing part of the administration's team on key issue, such as immigrations and law enforcement.

Because GAO is only a watchdog agency, its report does not carry the force of law, though it might be a factor in lawsuits in challenging the administration policies or influence of Congress.

DHS has rejected GAO findings.

“We wholeheartedly disagree with the GAO’s baseless report and plan to issue a formal response to this shortly," the agency said in a written response to questions.

White House spokesman Judd Deere said DHS is authorized by the Homeland Security Act to designate acting secretaries. “GAO is not,” he said. “And GAO’s opinion substituting its views for that of the agency’s is not only wrong, but laughable."

The Government Accountability Office said it has asked the DHS inspector general, a Trump appointee, to review the situation and determine if the violation affects decisions they have taken.

Rep. Bennie G. Thompson (D-MS), chair of the House Committee on Homeland Security suggested that Wolf step down, and return to his previous position. He also said Cuccinelli should resign. His opinion was echoed by Rep. Carolyn Maloney (D-NY), chair of the House Committee on Oversight and Reform.

Wolf should step down and return to the position he previously held in the department and Cuccinelli should resign, according to Reps. Bennie G. Thompson, chair of the House Committee on Homeland Security, and Carolyn Maloney, chair of the House Committee on Oversight and Reform.

“GAO’s damning opinion paints a disturbing picture of the Trump Administration playing fast and loose by bypassing the Senate confirmation process to install ideologues," the two Democrats said in a joint statement.

DHS, which was already under intense criticism for carrying out administration policies aimed at curbing legal and illegal immigration, found itself embroiled in more controversy this summer as it dispatched federal agents in tactical gear to Portland to confront protesters outside federal buildings without the cooperation of local authorities.

Sen. Chuck Schumer (D-NY), said the two officials should step down and DHS should conduct a legal review of all decisions made under their leadership. “President Trump's efforts to install political sycophants to implement his extreme policies in an end run around the law and Senate have finally caught up with him,” Schumer said.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3