Oversight

IG: USDA lacks internal controls on classified information

Shutterstock image: secured files.

The Agriculture Department does not have adequate internal controls to prevent incorrectly categorizing or improperly releasing classified information, according to an inspector general classification management audit.

Auditors noted that although they did not find any instances of leaked national security information, USDA's lack of internal controls increases the "potential for misclassification, over-classification and unauthorized release of national security information."

The report does not elaborate on the kinds of information that might be classified under USDA's authority, but a 2008 document from the Office of the CIO states that the secretary of Agriculture could order the classification of information about a pathogen that creates a high risk to health if included in a food product.

USDA's Office of Homeland Security and Emergency Coordination (OHSEC) is charged with managing the agency's security status. Within OHSEC, the Personnel and Document Security Division (PDSD) safeguards and manages security information and makes sure documents are properly classified.

A 2013 IG review uncovered weaknesses in OHSEC's internal management controls of classified material and made 17 recommendations. OHSEC agreed to all 17; however, the agency is behind schedule on addressing them.

During the IG's fiscal 2016 review, auditors found that 11 of the 17 recommendations remained open, and the director of OHSEC told auditors until May 2015, he was unaware that actions to strengthen internal controls were not being taken.

Specifically, auditors discovered that the agency had not implemented the records management system it had acquired in December 2012 to facilitate the declassification of documents. It was supposed to have been operational by the end of June 2016. Agency officials said a small number of documents had been added to the system but provided no corroborating documentation.

Auditors also said the documentation of self-inspections, which was estimated to be completed by the end of September 2014, still did not meet standards. PDS lacked documentation that any self-inspections had been completed in fiscal 2014 and could only show that eight of 19 subordinate agencies completed self-inspections in fiscal 2015.

Additionally, a program for training employees in how to handle classified information, which was estimated to be completed by the end of September 2014, was inadequate, according to auditors.

The IG recommended that OHSEC fulfill the previously agreed-to recommendations regarding management controls and internal reviews processes, track statistical classification data and develop its guidance for classification management and employee training programs. Furthermore, the IG urged top officials to pay close attention to implementation.

About the Author

Chase Gunter is a staff writer covering civilian agencies, workforce issues, health IT, open data and innovation.

Prior to joining FCW, Gunter reported for the C-Ville Weekly in Charlottesville, Va., and served as a college sports beat writer for the South Boston (Va.) News and Record. He started at FCW as an editorial fellow before joining the team full-time as a reporter.

Gunter is a graduate of the University of Virginia, where his emphases were English, history and media studies.

Click here for previous articles by Gunter, or connect with him on Twitter: @WChaseGunter

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.