Close Call

The consequences of budget brinksmanship.

In early 1996, shortly after the last federal government shutdown, President Clinton went before Congress to deliver his State of the Union address. At one point, he paused to recognize Richard Dean, a Vietnam veteran and longtime Social Security Administration employee, who was sitting in the audience.

"Last year," Clinton said of Dean, "he was hard at work in the federal building in Oklahoma City when the blast killed 169 people and brought the rubble down all around him. He re-entered that building four times. He saved the lives of three women. . . .

"But Richard Dean's story doesn't end there. This last November, he was forced out of his office when the government shut down. And the second time the government shut down he continued helping Social Security recipients, but he was working without pay. On behalf of Richard Dean and his family, and all the other people who are out there working every day doing a good job for the American people, I challenge all of you in this chamber: Never, ever shut the federal government down again."

Perhaps members of Congress, future lawmakers, and presidents-in-waiting were paying attention that night, because government hasn't been shut down since. But Congress and the White House came awfully close in early April. The story of how and why that happened, and the toll it took on the federal workforce, is told by Robert Brodsky in our cover story this month.

At Government Executive, we began following the twists and turns of the story last fall, when Republicans took control of the House and GOP members, especially Tea Party-backed freshmen, began threatening to close down federal operations if their demands for deep cuts in spending weren't met.

We published more than 150 stories on the specter of a shutdown from late October to the first week of April on our two websites, GovExec.com and Nextgov.

On April 8, as the midnight deadline to reach a budget deal approached, our sites received nearly half a million page views, as federal employees across the country desperately tried to figure out whether they'd be furloughed. "No official word yet, although hints that we are almost all unessential," one employee told us. "More info on GovExec than from management."

We were proud to be able to provide as much information as we could. But we certainly hope we don't have to do it again in September, when the deadline for the fiscal 2012 budget looms.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.