Hearings

Dec 2, 2015

Office of National Drug Control Policy: Reauthorization

PURPOSE: • To examine the Office of National Drug Control Policy (ONDCP) and their efforts to coordinate drug control policy and spending across the federal government. • To discuss the various proposals for reauthorization of ONDCP and its programs. • To examine ONDCP’s responses to Government Accountability Office reviews and the resulting recommendations. BACKGROUND: • Congress created ONDCP in 1988 as part of the Anti-Drug Abuse ...

Dec 1, 2015

Examining Invasive Species Policy

PURPOSE: • To examine the National Invasive Species Information Center (NISC) and its mission of treating and eradicating invasive species. • To discuss the ...

Nov 18, 2015

The Internet of Cars

PURPOSE: • To highlight how the automotive industry is tackling important issues around cybersecurity, spectrum, and privacy as the age of the connected vehicle rapidly approaches. • To give members of the Subcommittee an opportunity to learn about vehicle-to-vehicle communications technology and what it means for our future economy. BACKGROUND: • Connected vehicles are cars that “access, consume, create, ...

Nov 18, 2015

Federal Student Aid: Performance-Based Organization Review

WASHINGTON, D.C.—On Wednesday, November 18, the Subcommittee on Higher Education and Workforce Training, chaired by Rep. Virginia Foxx (R-NC), and the Oversight and Government Reform Subcommittee on Government Operations, chaired by Rep. Mark Meadows (R-NC), will hold a joint hearing titled, “Federal Student Aid: Performance-Based Organization Review.” The hearing will take place at 9:00 a.m. in room 2154 of the Rayburn House Office Building. The Department of ...

Nov 17, 2015

U.S. Department of Education: Information Security Review

TAKEAWAYS: • The Department of Education (DoEd) has at least 139 million unique social security numbers in its Central Processing System (CPS). • Reminiscent of OPM’s dangerous behavior, DoEd is not heeding repeat warnings from the Inspector General (IG) that their information systems are vulnerable to security threats. o In the IG’s latest report, there were 6 repeat findings and 10 repeat recommendations. o The Department scored NEGATIVE 14% on the OMB ...

Nov 5, 2015

Iran’s Power Projection Capability

  PURPOSE: • To examine Iran’s capability to project power by reviewing Iran’s military arsenal, financing, training, and arming of proxy groups in the region. • To expose how those capabilities may advance as a result of increased funding from sanctions relief. • To seek answers to critical questions about how the U.S. should be prepared to defend national security interests in the Middle East and at home against Iran’s advancement in power projection as ...

Nov 4, 2015

The Federal Information Technology Reform Act’s (FITARA) Role in Reducing IT Acquisition Risk, Part II – Measuring Agencies’ FITARA Implementation

PURPOSE: • To assess how Federal Information Technology Acquisition Reform Act (FITARA) implementation is progressing across federal agencies in four key areas: o Data center consolidation o IT portfolio review savings o Incremental development o Risk assessment transparency. BACKGROUND: • On June 10th, the Subcommittee held a hearing on the U.S. Government Accountability Office’s 2015 designation of IT acquisition as high ...

Nov 3, 2015

Preparing for the 2020 Census: Will the Technology be Ready?

PURPOSE: • To examine the Census Bureau’s (Bureau) progress in preparation for the 2020 census. • To discuss the challenges facing IT development and other operational issues with relevant personnel from the Bureau, the Commerce Department, and the U.S. Government Accountability Office. BACKGROUND: • In preparation for the 2020 census, the Bureau released its operational plan on October 6, 2015. This report illustrates the ...

Nov 3, 2015

TSA: Security Gaps

PURPOSE: • To explore with the agency’s new leadership the Transportation Security Administration’s (TSA) challenges and planned responses. • To provide members an open dialogue with TSA to discuss potential solutions to gaps ...

Oct 28, 2015

Radicalization: Social Media and the Rise of Terrorism

PURPOSE: • To address the scope of radicalization, and assess what steps can be taken in order to mitigate the rise of terror via social media. BACKGROUND: • In recent years, terrorist organizations have attempted to control their image, attract new recruits, and inspire “lone wolf” attacks through the use of social media, including disseminating images of graphic violence. • Terrorists’ use of social media is resonating ...