Senior DHS Officials Improperly Appointed

Senior DHS Officials Improperly Appointed

The Government Accounting Office (GAO) is now saying that acting DHS Chad Wolf and his active deputy, Ken Cuccinelli are ineligible to govern the agency to which they were appointed by the Trump administration. The non-partisan watchdog agency cited the Vacancy Reform Act.

Both men are acting officials, neither has senate approval. Presently, it is not clear how this presidential appointment might affect their ability to run the agency. DHS is clearing part of the administration's team on key issue, such as immigrations and law enforcement.

Because GAO is only a watchdog agency, its report does not carry the force of law, though it might be a factor in lawsuits in challenging the administration policies or influence of Congress.

DHS has rejected GAO findings.

“We wholeheartedly disagree with the GAO’s baseless report and plan to issue a formal response to this shortly," the agency said in a written response to questions.

White House spokesman Judd Deere said DHS is authorized by the Homeland Security Act to designate acting secretaries. “GAO is not,” he said. “And GAO’s opinion substituting its views for that of the agency’s is not only wrong, but laughable."

The Government Accountability Office said it has asked the DHS inspector general, a Trump appointee, to review the situation and determine if the violation affects decisions they have taken.

Rep. Bennie G. Thompson (D-MS), chair of the House Committee on Homeland Security suggested that Wolf step down, and return to his previous position. He also said Cuccinelli should resign. His opinion was echoed by Rep. Carolyn Maloney (D-NY), chair of the House Committee on Oversight and Reform.

Wolf should step down and return to the position he previously held in the department and Cuccinelli should resign, according to Reps. Bennie G. Thompson, chair of the House Committee on Homeland Security, and Carolyn Maloney, chair of the House Committee on Oversight and Reform.

“GAO’s damning opinion paints a disturbing picture of the Trump Administration playing fast and loose by bypassing the Senate confirmation process to install ideologues," the two Democrats said in a joint statement.

DHS, which was already under intense criticism for carrying out administration policies aimed at curbing legal and illegal immigration, found itself embroiled in more controversy this summer as it dispatched federal agents in tactical gear to Portland to confront protesters outside federal buildings without the cooperation of local authorities.

Sen. Chuck Schumer (D-NY), said the two officials should step down and DHS should conduct a legal review of all decisions made under their leadership. “President Trump's efforts to install political sycophants to implement his extreme policies in an end run around the law and Senate have finally caught up with him,” Schumer said.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3