Stopgap spending measure provides clarity to sequester threat

Elena Yakusheva/

The potential sequestration scheduled for January 2013 creates a lot of uncertainty for the government, but if that dreaded scenario occurs, then the recently enacted six-month spending measure makes some things clearer.

Federal employees have wondered how the six-month continuing resolution funding the government through March would affect the automatic, across-the-board spending cuts set to take effect Jan. 2, 2013. One Government Executive reader asked, “I think a lot of us are confused about how the CR at 2012 levels inter-relate with sequestration impacts. Will we toodle along at 2012 funding levels for six months and then [see] draconian cuts in the second half of the year if the reductions are implemented?”

The short answer is, no. Here’s the long answer: If lawmakers can’t agree on an alternative, then agencies will use the sequestration formula to assign cuts in January to more than 1,200 budget accounts, as the law mandates. Those cuts will be apportioned throughout the remaining nine months of fiscal 2013; the figures in the formula are based on the current six-month continuing resolution that sets fiscal 2013 funding at the level the 2011 Budget Control Act mandates, keeping spending at the fiscal 2012 rate for agencies and federal programs with an across-the-board increase of 0.6 percent over the base rate, for a total of $1.047 trillion.

Congress has not passed any fiscal 2013 appropriations bills yet, which made the continuing resolution necessary to avoid a government shutdown on Sept. 30. Regardless of what lawmakers do for the rest of fiscal 2013 after the current CR expires on March 27 -- pass another CR, pass a budget through the regular appropriations process -- the spending reduction levels that sequestration triggered already would be in effect based on that $1.047 trillion figure because it’s the discretionary spending cap dictated by the Budget Control Act for fiscal 2013 and it will be the government funding measure in place on Jan. 2. Of course, if lawmakers halt or delay sequestration through legislative action at any time, that’s another story.

If Congress allows sequestration to take effect, then it will result in savings of $109 billion governmentwide in fiscal 2013, for a grand total of $1.2 trillion in savings through fiscal 2021. It will affect thousands of agency projects, programs and activities, with reductions split equally between defense and nondefense spending (about $55 billion each) in fiscal 2013.

The Office of Management and Budget released a congressionally mandated report in September that estimated sequestration would impose cuts of 9.4 percent in nonexempt defense discretionary funding and 8.2 percent in nonexempt, nondefense discretionary funding. A 2 percent cut would hit Medicare providers, 7.6 percent would affect other nonexempt nondefense mandatory programs, and 10 percent would be applied to nonexempt defense mandatory programs. Those figures were based on fiscal 2012 spending levels, which are slightly below the $1.047 billion CR, so the percentage reductions trigged by sequestration could be a little lower than OMB projected. The difference, however, would be nominal and still significantly impact government operations.

(Image via Elena Yakusheva/

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.