CBO: Sequestration Cuts Are Unlikely This Year


The fiscal 2014 budget that President Obama signed last December contained enough cuts and revenues to avoid across-the-board cuts this year, the Congressional Budget Office confirmed Thursday.

In its mandatory biannual update on sequestration, the nonpartisan office said that with Congress in having made only minor adjustments to the spending caps required under the 2011 Budget Control Act, little has changed from its January 2014 assessment that no budgetary cancellations will be needed before fiscal 2014 ends Oct. 1.

The omnibus spending bill now in effect updated the original sequester law and set new caps for 2015 that are $18.5 billion above what the limits would have been otherwise.

The Office of Management and Budget, CBO noted, has sole authority to decide whether new sequestration cuts are required, and it agreed in February that none are needed this year.

One reason for the stability is that the sole major appropriation in fiscal 2014 was $5.6 billion in emergency disaster relief following Hurricane Sandy, which OMB handled by adjusting its nondefense spending cap by that same amount for fiscal 2015.

In the out-years, however, sequestration left unchanged will continue to pinch, though less abruptly. The cap on discretionary budget authority for defense will grow from $521 billion in 2015 to $523 billion in 2016 and then to $590 billion in 2021, CBO estimates.

The cap on nondefense funding will be $492 billion in 2015 and 2016 and then rise to an estimated $555 billion for 2021.

Spending cuts for defense programs will be proportionately larger than those for nondefense programs, CBO said.

(Image via karelnoppe/Shutterstock.com)

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.