recommended reading

Congressional Picks for DHS Head Include Backers of Mass Surveillance

Rep. Loretta Sanchez, D-Calif., is among the possible candidates.

Rep. Loretta Sanchez, D-Calif., is among the possible candidates. // Defense Department

To fill the top job running the Homeland Security Department after Secretary Janet Napolitano steps down, lawmakers on the House Homeland Security Committee are suggesting individuals who have supported programs similar to National Security Agency digital surveillance initiatives. Napolitano is leaving DHS in September to lead the University of California.

Among the people ranking Democrat Rep. Bennie Thompson, D-Tenn., would prefer, according to minority committee aides, is Rep. Loretta Sanchez, D-Calif., a committee member who supported the divisive Cyber Intelligence Sharing and Protection Act, known as CISPA. The measure, which the House approved by a 288-127 vote in April, would allow the intelligence community to monitor the metadata of private emails for threat signatures or indicators of malicious software.  

NSA is facing global criticism for tapping foreigners' Web communications and Americans’ incidentally-collected Internet correspondence, as well as the phone metadata of millions of U.S. citizens.

Sanchez successfully introduced a CISPA amendment aimed at blunting the power of intelligence officials to evade civil liberties oversight by assigning DHS officials to report to Congress on the legislation’s impact.  

Thompson sent President Obama a letter on Monday asking that he select someone with “a demonstrated record of respecting privacy and civil rights." 

Committee Chairman and Texas Republican Michael McCaul has recommended, among others, New York City Police Commissioner Raymond Kelly, a long-time proponent of collecting and analyzing large amounts of data to detect crime trends and an advocate of using video cameras to monitor urban streets. 

While a fan of data analytics, Kelly reportedly criticized NSA for keeping its mass data collections secret. The programs were revealed only after ex-NSA contractor Edward Snowden leaked documents detailing surveillance operations to the media. Kelly also has said NSA must protect its data better. 

Following the Boston Marathon explosions, he dismissed critics who argued that installing urban cameras threatens privacy by granting governments the ability to track citizens in public spaces, the WNYC News reported. The technology helped authorities identify the Boston bombers.

Kelly also champions CompStat, short for computerized or comparative statistics, an initiative that maps crime patterns to increase accountability across police forces. The crime-reporting program started in New York City during the mid-1990s and has been replicated by many major cities. 

Republican aides on Monday said McCaul also has mentioned Retired Coast Guard Commandant Adm. Thad Allen as a good choice to replace Napolitano. Obama tapped Allen in 2010 to coordinate the federal response to the BP oil spill. During the crisis, a joint information center tracked Tweets and other social media around-the-clock to quash rumors and identify concerns in the Gulf region.

Another Thompson pick is Massachusetts Governor Deval Patrick, who then-President Clinton in 1994 appointed assistant attorney general for civil rights. Patrick defended federal information sharing practices in the aftermath of the Boston bombings, according to WGBH News. FBI agents did not tell Boston police about warnings from Russia’s government involving suspect Tamerlan Tsarnaev, but Patrick said alerting the police would not have been enough to stop the attacks. Republican lawmakers, including McCaul, have questioned the disconnect in communication.

Rounding out Thompson's list are committee member Rep. Sheila Jackson Lee, D-Texas, and Erroll Southers, who in 2010 withdrew his name from consideration for Transportation Security Administration director after growing disenchanted with Senate politics.

Threatwatch Alert

Stolen laptop

3.7M Hong Kong Voters' Personal Data Stolen

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.