GOP aims for Tuesday consideration of short-term spending bill

House Republican leaders are set to unveil their proposal for another stopgap spending bill that cuts $4 billion from current discretionary spending levels and keeps the government running for two more weeks while Democrats and Republicans negotiate a compromise for the remainder of the fiscal year. The House is likely to begin consideration of the short-term continuing resolution on Tuesday.

In a conference call Friday, House Majority Leader Rep. Eric Cantor, R-Va., said the proposal is a good-faith effort that would give lawmakers until March 18 to reach an agreement to fund the government for the rest of the fiscal year. The current CR expires March 4.

"A government shutdown is not an acceptable or responsible option for Republicans," Cantor said.

The $4 billion in cuts comes from reductions and terminations to programs recommended in President Obama's fiscal 2012 budget proposal, as well as funding from some earmarks, which Congress and the White House have all sworn off.

"We hope the Senate will finally join us in these common-sense cuts to keep the government running and not continue to play chicken with a government shutdown," Cantor said.

House Majority Whip Rep. Kevin McCarthy, R-Calif., who was also on the call, said the two-week window is long enough to find a compromise but short enough to keep the pressure on. The shutdown rhetoric from both Republicans and Democrats has heightened in recent days as the March 4 deadline approaches.

The House's short-term CR comes after House Republicans last week passed a CR for the remainder of the fiscal year that would cut about $60 billion from current discretionary spending levels.

House Speaker John Boehner, R-Ohio, outlined the two-week proposal this week after Senate Majority Leader Harry Reid, D-Nev., announced his own plans to bring up a 30-day CR that freezes spending at current levels.

The House CR is a non-starter for Senate Democrats, who charge that it would slow the nascent economic recovery and hurt the poor, who predominantly rely on government services.

Sen. Bernie Sanders, I-Vt., said Friday in a release that the GOP CR seeks to balance the budget "by cutting desperately needed programs for hardworking Americans. Democrats must fight back and say 'no' to continued attacks on working families."

Senate Appropriations Committee Chairman Daniel Inouye, D-Hawaii, who is also chairman of the Defense Appropriations Subcommittee, has scheduled a hearing next week to hear from military officials on the House's long-term CR proposal's effects on the Pentagon.

Senate Democrats are working on a CR proposal that would fund the government through the rest of the fiscal year and cut $8.5 billion by eliminating previously approved earmarks, according to aides. The bill would also accelerate some of the $24.7 billion in program eliminations or reductions sought by Obama in his fiscal 2012 budget proposal. The Democrats' plan would reduce that funding starting after March 4, not on October 1, at the start of the 2012 fiscal year.

Some Republicans, including Senate Minority Leader Mitch McConnell, R-Ky., have suggested that the House long-term CR package would pick up some Democratic support if it reached the Senate floor.

Cantor said that, if true, "it is a testament to how much Republicans are changing the culture in Washington, but we will have to wait and see."

Dan Friedman contributed to this story.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.