Licking terror with FEMA funds for . . . "Sno-Cone'' machines?


Why was $11,700 in homeland security grant money used in Michigan for the purchase of "Sno-Cone" machines for several counties? That is what a member of the House Homeland Security Committee is demanding to know from the Federal Emergency Management Agency. Rep. Gus Bilirakis, R-Fla., chairman of the Subcommittee on Emergency Preparedness, Response, and Communications, says in a letter to FEMA Director Craig Fugate released Wednesday that he wants to know if the agency was even aware that the shaved-ice dessert machines were purchased, and he suggests the episode raises questions about oversight of homeland security funding.

"Will FEMA require the state of Michigan to sell or return the 13 dessert machines, and use the $11,700 for a legitimate homeland security investment?" Bilirakis also asks in his letter to Fugate.

There was no immediate response Wednesday from FEMA's press office.

Bilirakis footnotes his source of information to an item initially published Dec. 3 by the Daily News, in Greenville, Belding, and Montcalm County, Mich., that is headlined: "The United States is Fighting Terrorism -- One Snowcone At A Time."

That local item reported that questions were being raised by members of the Montcalm County, Mich., Board of Commissioners about why and how the 13 machines had been funded -- with federal emergency funds?

Bilirakis's letter to Fugate goes on to explain that it has since come to his attention that the West Michigan Shoreline Regional Development Commission - the agency responsible for administering the Homeland Security Grant Program funds in 13 Michigan Counties - was the agency that spent the money for the machines.

And Bilirakis's letter is incredulous in pointing out that the "official cost justification" submitted for the purchase of the machines by the regional administration was that, "This tool can be used at public education and outreach events to entice volunteers to stop by recruitment booths and receive public education about promotional material about Citizens Corps and preparedness activities - along with shaved ice."

But by this rationale, complains Bilirakis in his letter, "any amusements that might appeal to community residents for purposes of outreach, such as balloons, entertainers, and popcorn machines, would qualify as homeland security equipment." In fact, according to the initial local blog item about the purchases, one Michigan County had actually requested a popcorn machine but was denied.

Bilirakis's letter also takes issue with a rationale for buying the shaved-ice machines that he says was later given by the regional development commission's director - that "these ice rehabilitation machines will assist with treating the onset of heat exhaustion and stroke during large scale events or activities - including possible terrorist incidents or similar emergencies."

Michigan emergency officials also sought to justify the usefulness of the machines by suggesting they could be used to make ice packs. And in another effort at fending off questions about the legitimacy of the purchase, a Montcalm County Emergency Services director suggested the machines be referred to as "ice shavers," rather than Sno-Cone machines, despite the fact that they were emblazoned with the advertisement: "Ice Cold Sno-Cones, Refreshing."

"While I will agree that snow cones are a refreshing treat, at a time when budgets are strained and the government is looking for ways to cut costs, it is unacceptable to be using taxpayer dollars meant to protect our country on these kinds of items," Bilirakis said in a statement. "This particular instance makes me wonder what else homeland security dollars are being used for, and makes me skeptical about FEMA's ability to ensure that these funds are not being squandered."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.