Senior DHS Officials Improperly Appointed

Senior DHS Officials Improperly Appointed

The Government Accounting Office (GAO) is now saying that acting DHS Chad Wolf and his active deputy, Ken Cuccinelli are ineligible to govern the agency to which they were appointed by the Trump administration. The non-partisan watchdog agency cited the Vacancy Reform Act.

Both men are acting officials, neither has senate approval. Presently, it is not clear how this presidential appointment might affect their ability to run the agency. DHS is clearing part of the administration's team on key issue, such as immigrations and law enforcement.

Because GAO is only a watchdog agency, its report does not carry the force of law, though it might be a factor in lawsuits in challenging the administration policies or influence of Congress.

DHS has rejected GAO findings.

“We wholeheartedly disagree with the GAO’s baseless report and plan to issue a formal response to this shortly," the agency said in a written response to questions.

White House spokesman Judd Deere said DHS is authorized by the Homeland Security Act to designate acting secretaries. “GAO is not,” he said. “And GAO’s opinion substituting its views for that of the agency’s is not only wrong, but laughable."

The Government Accountability Office said it has asked the DHS inspector general, a Trump appointee, to review the situation and determine if the violation affects decisions they have taken.

Rep. Bennie G. Thompson (D-MS), chair of the House Committee on Homeland Security suggested that Wolf step down, and return to his previous position. He also said Cuccinelli should resign. His opinion was echoed by Rep. Carolyn Maloney (D-NY), chair of the House Committee on Oversight and Reform.

Wolf should step down and return to the position he previously held in the department and Cuccinelli should resign, according to Reps. Bennie G. Thompson, chair of the House Committee on Homeland Security, and Carolyn Maloney, chair of the House Committee on Oversight and Reform.

“GAO’s damning opinion paints a disturbing picture of the Trump Administration playing fast and loose by bypassing the Senate confirmation process to install ideologues," the two Democrats said in a joint statement.

DHS, which was already under intense criticism for carrying out administration policies aimed at curbing legal and illegal immigration, found itself embroiled in more controversy this summer as it dispatched federal agents in tactical gear to Portland to confront protesters outside federal buildings without the cooperation of local authorities.

Sen. Chuck Schumer (D-NY), said the two officials should step down and DHS should conduct a legal review of all decisions made under their leadership. “President Trump's efforts to install political sycophants to implement his extreme policies in an end run around the law and Senate have finally caught up with him,” Schumer said.

About the Author

Ralph C. Jensen is the Publisher/Editor in chief of Security Today magazine.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.