Furloughs, hiring freeze on the table as Defense begins sequester planning

Pentagon Press Secretary George Little Pentagon Press Secretary George Little Luis M. Alvarez/AP

The Defense Department has begun planning to implement a fiscal 2013 budget sequester in January, a spokesman confirmed Wednesday.

“We are consulting with the Office of Management and Budget and have been instructed to pursue internal planning on sequestration,” the spokesman, George Little, said at a press availability today, according to a report in American Forces Press Service. “We are at the very start. We don’t have all of the details firmed up. Naturally, we hope very much that sequestration will be avoided. We don’t want to go off the fiscal cliff.”

OMB delivered sequester guidance to the Pentagon this week. Little said the department would have to do some “detailed planning” on the “specific consequences of sequestration.”

In late September, Robert Hale, undersecretary of Defense and chief financial officer, said at a Government Executive event that there would be a “high probability” of both a hiring freeze and furloughs of current employees should Congress allow the sequestration process to go forward.

“There’s a long process with furloughs,” Hale said. “It will adversely affect our missions, not to mention the people involved.”

Defense officials have long warned of the adverse effects of a sequester, and urged members of Congress to come to a budget agreement that would prevent it from going into effect on Jan. 2.

Under sequestration, the Defense budget would be cut by about $500 billion over 10 years, on top of $487 billion in cuts already in the works.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.