Antony J. Blinken, Secretary of State
I extend my warmest wishes to all Muslims in the United States and around the world celebrating Eid al-Fitr.
On this Eid al-Fitr, we reflect on the values of charity, community, cooperation, and compassion, and, in the face of a global pandemic, we honor the Muslims worldwide who came together to pray and fast with their families, instead of with their larger communities. These sacrifices have not gone unnoticed and have helped in keeping all communities safe and healthy. We further recognize the contributions of Muslim frontline workers throughout the tragedy of this pandemic. Their selflessness is an inspiration to us all.
We also keep in our thoughts those who have experienced hardships and have fled violence, along with those who have helped them on their journey, reminding us all to continue to work locally and globally – not just to save lives – but to restore dignity and understanding for all people, especially during this extraordinary time of need.
I regret very much that I am unable to host an Eid al-Fitr celebration this year due to the pandemic, but I will continue to forge and deepen the strong relationships we enjoy with diverse Muslim communities. I wish you all a happy Eid al-Fitr. Eid Mubarak.
- Missouri Man Indicted on Federal Hate Crime and Firearm ChargesBy Sam NewsAugust 11, 2021A federal grand jury in Kansas City, Missouri, returned a two-count indictment charging a Missouri man with hate crime and firearm violations for shooting a teenager with the intent to kill because of the victim’s sexual orientation.[Read More…]
- Secretary Blinken’s Call with Former Canadian Foreign Minister GarneauBy Sam NewsNovember 3, 2021
- Deputy Secretary Biegun’s Meeting with the Bosnia and Herzegovina PresidencyBy Sam NewsNovember 20, 2020
- National Day of the Federated States of MicronesiaBy Sam NewsNovember 2, 2020Michael R. Pompeo, [Read More…]
- Justice Department Resolves ADA Complaint with Maine Department of Health and Human ServicesBy Sam NewsJune 4, 2021The Justice Department today reached an agreement with the Maine Department of Health and Human Services (DHHS) to resolve alleged violations of the Americans with Disabilities Act (ADA).[Read More…]
- Information Technology: Agencies Need to Develop and Implement Modernization Plans for Critical Legacy SystemsBy Sam NewsApril 27, 2021What GAO Found In June 2019, GAO identified 10 critical federal information technology (IT) legacy systems that were most in need of modernization. These legacy systems provided vital support to agencies' missions. According to the agencies, these legacy systems ranged from about 8 to 51 years old and, collectively, cost about $337 million annually to operate and maintain. Several of the systems used older languages, such as Common Business Oriented Language (COBOL). GAO has previously reported that reliance on such languages has risks, such as a rise in procurement and operating costs, and a decrease in the availability of individuals with the proper skill sets. Further, several of the legacy systems were operating with known security vulnerabilities and unsupported hardware and software. Of the 10 agencies responsible for these legacy systems, GAO reported in June 2019 that seven agencies (the Departments of Defense, Homeland Security, the Interior, the Treasury; as well as the Office of Personnel Management; Small Business Administration; and Social Security Administration) had documented plans for modernizing the systems (see table). Of the seven agencies with plans, only the Departments of the Interior's and Defense's modernization plans included all of the key elements identified in best practices (milestones, a description of the work necessary to complete the modernization, and a plan for the disposition of the legacy system). The other five agencies lacked complete modernization plans. The Departments of Education, Health and Human Services, and Transportation did not have documented modernization plans. Table: Extent to Which Agencies' Had Documented Modernization Plans for Legacy Systems That Included Key Elements, as of June 2019 Agency Included milestones to complete the modernization Described work necessary to modernize system Summarized planned disposition of legacy system Department of Defense Yes Yes Yes Department of Education n/a – did not have a documented modernization plan Department of Health and Human Services n/a – did not have a documented modernization plan Department of Homeland Security No Yes No Department of the Interior Yes Yes Yes Department of the Treasury Partial Yes No Department of Transportation n/a – did not have a documented modernization plan Office of Personnel Management Partial Partial No Small Business Administration Yes No Yes Social Security Administration Partial Partial No Source: GAO analysis of agency modernization plans. | GAO-21-524T Agencies received a “partial” if the element was completed for a portion of the modernization. GAO stressed that, until the eight agencies established complete plans, their modernizations would face an increased risk of cost overruns, schedule delays, and project failure. Accordingly, GAO recommended that each of the eight develop such plans. However, to date, seven of the agencies had not done so. It is essential that agencies implement GAO's recommendations and these plans in order to meet mission needs, address security risks, and reduce operating costs. Why GAO Did This Study Each year, the federal government spends more than $100 billion on IT and cyber-related investments. Of this amount, agencies have typically spent about 80 percent on the operations and maintenance of existing IT investments, including legacy systems. However, federal legacy systems are becoming increasingly obsolete. In May 2016, GAO reported instances where agencies were using systems that had components that were at least 50 years old or the vendors were no longer providing support for hardware or software. Similarly, in June 2019 GAO reported that several of the federal government's most critical legacy systems used outdated languages, had unsupported hardware and software, and were operating with known security vulnerabilities. GAO was asked to testify on its June 2019 report on federal agencies' legacy systems. Specifically, GAO summarized (1) the critical federal legacy systems that we identified as most in need of modernization and (2) its evaluation of agencies' plans for modernizing them. GAO also provided updated information regarding agencies' implementation of its related recommendations.[Read More…]
- Federal Court Bars Florida Tax Preparation Businesses and Their Tax Return Preparers from Preparing Tax ReturnsBy Sam NewsAugust 16, 2021A federal court in the Southern District of Florida, West Palm Beach Division, has permanently enjoined four Palm Beach-area tax return preparers from preparing federal income tax returns for others and from owning or operating any tax return business in the future.[Read More…]
- Luxembourg National Day By Sam NewsJune 23, 2021Antony J. Blinken, [Read More…]
- Secretary Blinken’s Call with EU High Representative for Foreign Affairs and Security Policy BorrellBy Sam NewsMay 17, 2021
- High-Level Meetings on EthiopiaBy Sam NewsOctober 12, 2021
- An Information-Centric Perspective on Coherence Collaboration: Analyses of Uganda and Ecuador (Penn State)By Sam NewsSeptember 27, 2020Bureau of Population, [Read More…]
- Superfund: EPA Should Take Additional Actions to Manage Risks from Climate Change EffectsBy Sam NewsMay 13, 2021What GAO Found In October 2019, GAO reported that available federal data on flooding, storm surge, wildfires, and sea level rise suggested that about 60 percent (945 of 1,571) of all nonfederal Superfund National Priorities List (NPL) sites—which have serious hazardous contamination--are located in areas that may be impacted by these potential climate change effects (see figure). In 2019, GAO released an interactive map and dataset, available with its report (GAO-20-73). Nonfederal NPL Sites Located in Areas That May Be Impacted by Flooding, Storm Surge, Wildfires, or Sea Level Rise, as of 2019 Notes: This map does not display all 1,571 active and deleted nonfederal NPL sites GAO analyzed in 2019, which also include six sites in American Samoa, the Federated States of Micronesia, Guam, the Northern Mariana Islands, and the U.S. Virgin Islands, though they are included in the counts above. Learn more at https://www.gao.gov/products/GAO-20-73. Storm surge data were not available for the West Coast and Pacific islands other than Hawaii, wildfire data were not available outside the contiguous United States, and sea level rise data were not available for Alaska. GAO also reported in 2019 that the Environmental Protection Agency's (EPA) actions to manage risks from climate change effects at these sites aligned with three of GAO's six essential elements of enterprise risk management, partially aligned with two, and did not align with one. For example, EPA had not aligned its process for managing risks with agency-wide goals. Without clarifying this linkage, EPA could not ensure that senior officials would take an active role in strategic planning and accountability for managing these risks. In 2019, GAO found that EPA recognized institutional, resource, and technical challenges in managing risks from climate change effects. For example, some EPA officials told us they do not have the direction they need to manage these risks. Insufficient or changing resources may also make it challenging for EPA to manage these risks, according to EPA documents and officials. Why GAO Did This Study Superfund is the principal federal program for addressing sites contaminated with hazardous substances. EPA administers the program and lists some of the most seriously contaminated sites—most of which are nonfederal—on the NPL. At those sites, EPA has recorded over 500 contaminants, including arsenic and lead. Climate change may make some natural disasters more frequent or more intense, which may damage NPL sites and potentially release contaminants, according to the Fourth National Climate Assessment. This testimony summarizes GAO's October 2019 report (GAO-20-73) on the impact of climate change on nonfederal NPL sites. Specifically, it discusses (1) what available federal data suggest about the number of nonfederal NPL sites that are located in areas that may be impacted by selected climate change effects; (2) the extent to which EPA has managed risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites; and (3) challenges EPA faces in managing these risks.[Read More…]
- Associate Attorney General Vanita Gupta Delivers Remarks at Georgetown Law’s 15th Annual Global Antitrust Enforcement SymposiumBy Sam NewsSeptember 14, 2021Thank you for that kind introduction and for inviting me to speak at the 15th Annual Global Antitrust Enforcement Symposium hosted by Georgetown Law School. I bring greetings from the Attorney General.[Read More…]
- Priority Open Recommendations: Internal Revenue ServiceBy Sam NewsJune 14, 2021What GAO Found In April 2020, GAO identified 24 priority recommendations for the Internal Revenue Service (IRS). Since then, IRS has implemented 9 of those recommendations by, among other things, defining appropriate levels of telephone and correspondence service for taxpayers and developing a strategy to improve services to taxpayers across all service channels. In June 2021, GAO identified 10 additional priority recommendations for IRS, bringing the total number to 25. These recommendations involve the following areas: Improve payment integrity Reduce tax fraud Improve information security Improve audit effectiveness Improve taxpayer services Enhance strategic human capital management Enhance information reporting Full implementation of these recommendations could significantly improve IRS's operations. Why GAO Did This Study Priority open recommendations are the GAO recommendations that warrant priority attention from heads of key departments or agencies because their implementation could save large amounts of money; improve congressional and/or executive branch decision-making on major issues; eliminate mismanagement, fraud, and abuse; or ensure that programs comply with laws and funds are legally spent, among other benefits. Since 2015 GAO has sent letters to selected agencies to highlight the importance of implementing such recommendations. For more information, contact James R. McTigue, Jr. or Jessica Lucas-Judy at (202) 512-6806 or email@example.com or firstname.lastname@example.org.[Read More…]
- Syndemics and the Commitment to Quitting EquitablyBy Sam NewsMay 30, 2021May 27, 2021 By: Leith [Read More…]
- COVID-19: Selected Agencies Overcame Technology Challenges to Support Telework but Need to Fully Assess Security ControlsBy Sam NewsSeptember 30, 2021What GAO Found Each of the 12 agencies GAO selected for review had information technology (IT) in place to support remote access for telework during the COVID-19 pandemic. Although the agencies initially experienced IT challenges in supporting remote access for maximum telework, they generally overcame them. For example, seven agencies were challenged in providing sufficient bandwidth to provide remote access for teleworkers, but they increased bandwidth as needed to ensure networks could handle additional remote connections. In addition, while the increased number of remote connections brings additional cybersecurity risks, all of the selected agencies reported that they continued activities intended to help ensure the security of their information and systems. While the selected agencies had documented elements of a telework security policy, such as permitted telework devices and forms of remote access, not all agencies had fully addressed other relevant federal guidance for securing their systems that support remote access for telework (see figure). Specifically, two agencies had not fully documented relevant IT security controls to protect those systems. In addition, assessments for systems that five agencies relied upon for remote access did not address all relevant controls to ensure the controls were operating effectively. Further, four selected agencies had not fully documented remedial actions to mitigate weaknesses they had previously identified. Extent to Which 12 Selected Agencies Followed Federal Information Security Guidance in Implementing Their IT Systems That Support Remote Access for Telework Although one of the selected agencies subsequently resolved its shortcomings, others had not. For the agencies that did not fully follow federal information security guidance, agency IT security officials stated that these conditions existed for various reasons, such as out-of-date documentation, among others. If agencies do not sufficiently document relevant security controls, assess the controls, and fully document remedial actions for weaknesses identified in security controls, they are at increased risk that vulnerabilities in their systems that provide remote access could be exploited. Why GAO Did This Study In response to the onset of the COVID-19 pandemic, in March 2020 the Office of Management and Budget directed federal agencies to maximize their use of telework to enable the workforce to remain safe while ensuring that government operations continue. Telework is essential to continuity of operations but also brings added cybersecurity risks. The CARES Act contains a provision for GAO to monitor the federal response to the pandemic. GAO was also asked to examine federal agencies' preparedness to support expanded telework. GAO's objectives were to determine (1) selected agencies' initial experiences in providing the IT needed to support remote access for maximum telework and (2) the extent to which selected agencies followed federal information security guidance for their IT systems that provide remote access. GAO selected 12 agencies for review that varied in their percentages of reported employee telework use and sent a questionnaire to solicit these agencies' perspectives on the use of IT in transitioning to maximum telework. GAO also reviewed the selected agencies' information security documentation and interviewed relevant officials.[Read More…]
- Secretary Antony J. Blinken with Izumi Oguri of Nippon TVBy Sam NewsMarch 17, 2021Antony J. Blinken, [Read More…]
- Another extradition lands third ELN member on U.S. soil for international cocaine distributionBy Sam NewsIn Justice NewsSeptember 21, 2021Another alleged [Read More…]
- Foreign Police Assistance: Defined Roles and Improved Information Sharing Could Enhance Interagency CollaborationBy Sam NewsAugust 24, 2021What GAO Found The United States provided an estimated $13.9 billion for foreign police assistance during fiscal years 2009 through 2011. Funds provided by U.S. agencies rose and then fell between fiscal years 2009 and 2011. During fiscal years 2009 through 2011, the United States provided the greatest amount of its foreign police assistance to Afghanistan, Iraq, Pakistan, Colombia, Mexico, and the Palestinian Territories. Department of Defense (DOD) and State (State) funds constituted about 97 percent of U.S. funds for police assistance in fiscal year 2009 and 98 percent in fiscal years 2010 and 2011. DOD and States Bureau of International Narcotics and Law Enforcement Affairs (State/INL) have acknowledged limitations in their procedures to assess and evaluate their foreign police assistance activities and are taking steps to address them. DOD assesses the performance of the police forces it trains and equips in Afghanistan, Iraq, and Pakistan. However, the assessment process for Afghanistan does not provide data on civil policing effectiveness. DOD plans to expand its assessments to obtain data to assess the ability of these forces to conduct civil policing operations. In addition, recognizing that it had conducted only one evaluation of its foreign police assistance activities because it lacked guidelines, State/INL is developing an evaluation plan that is consistent with States February 2012 Evaluation Policy. This evaluation plan includes conducting evaluations for its largest programs in Iraq and Mexico. U.S. agencies have implemented various mechanisms to coordinate their foreign police assistance activities as part of wider foreign assistance activities, such as the National Security Councils (NSC)-led interagency policy committees that coordinate policies at a high level and various working groups at the overseas posts. However, GAO noted some areas for improvement. Specifically, NSC has not defined agencies roles and responsibilities for assisting foreign police. Further, DOD and State do not consistently share and document information. For example, DOD did not provide copies of its capability assessments of the Iraqi police to State, which is now responsible for police development in Iraq, because it destroyed the database containing the assessments at the end of its mission to train the police. Further, some U.S. embassies, including the one in Bogotá, Colombia, do not publish agendas or minutes of their proceedings. Why GAO Did This Study In April 2011, we reported that the United States provided an estimated $3.5 billion for foreign police assistance to 107 countries during fiscal year 2009. We agreed to follow up that report with a review of the extent to which U.S. agencies evaluated and coordinated their foreign police assistance activities. As such, this report (1) updates our analysis of the funding U.S. agencies provided for foreign police assistance during fiscal years 2009 through 2011, (2) examines the extent to which DOD and State/INL assess or evaluate their activities for countries with the largest programs, and (3) examines the mechanisms U.S. agencies use to coordinate foreign police assistance activities. GAO focused on DOD and State because they have the largest foreign police assistance programs. GAO analyzed program and budget documents and interviewed officials from DOD, State, Energy, the U.S. Agency for International Development, Justice, the Treasury, and Homeland Security.[Read More…]
- White Supremacists Plead Guilty to Violent Crime in Aid of RacketeeringBy Sam NewsMarch 4, 2021Two members of the Aryan Circle (AC) pleaded guilty this week to their roles in a violent assault of a man in October 2016.[Read More…]