Postal facility set to open in November

Just over two years after being contaminated with anthrax, the Joseph Curseen and Thomas Morris Processing and Distribution Center in Washington is scheduled to reopen at the end of November. Administrative staff will return to the facility first, with mail sorting and other craft employees returning shortly thereafter.

Yet, as the agency prepares staff to re-enter the facility, there is ample concern over the Postal Service's response to the October 2001 anthrax attacks as well as any future biohazard attacks.

In a situation eerily similar to the anthrax incident, the Postal Service on Oct. 23 shut down a mail sorting facility in Greenville, S.C., after the Centers for Disease Control and Prevention confirmed that an envelope handled at the facility contained the deadly toxin ricin. A postal worker discovered the suspicious envelope, which had the words "caution ricin poison" typed on the outside, on Oct. 15. Officials did not decide to shut down the facility until receiving test results from the CDC. The facility has been tested and deemed safe for workers.

The letter was not part of a terrorist attack, but rather a protest over recent trucking regulations issued by the Transportation Department.

It's common for the agency to get dozens of hoax letters and packages every day, Thomas Day, the Postal Service's vice president for engineering, told the House Government Reform Committee Thursday. Since the anthrax attacks, the agency has responded to nearly 20,000 incidents involving suspicious substances. It's prudent to wait for advice from public health officials before acting, he said.

During the anthrax attacks, Postal Service officials waited several days after a contaminated letter was opened in a Senate office building before closing the Curseen and Morris plant, formerly known as the Brentwood postal facility. At the time, agency officials relied on the best available information from the CDC. Current and former postal employees are suing the agency, alleging that such action put their lives at risk. They also charge that the agency withheld critical information related to the contamination.

While praising the agency for efforts to open a dialogue with workers during the months following the anthrax attacks, union officials told the committee that communication has faltered recently. For instance, the American Postal Workers Union didn't find out that the facility was cleared for re-entry until a month after final test results were delivered to the agency.

"If this hearing hadn't been scheduled, I doubt we would have the [results] even now," said Mike Reid, assistant legislative director at APWU.

Reid also said that employees have not received adequate training on how to respond to future incidents.

Del. Eleanor Holmes Norton, D-D.C., said the committee will press postal officials to better detail their plans to train employees.

It's not clear how many postal workers will return to the facility. The agency and its major employee unions have agreed to accommodate any worker who wants to be reassigned to a different Washington-area plant.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.