recommended reading

Lapse in Chemical Security Effort Cited as Another Reason to End Shutdown

Jiri Vratislavsky/

The Obama administration is adding the closure of the Homeland Security Department's chemical security program to its list of reasons why Congress should end the partial government shutdown that began last week.

The Chemical Facilities Anti-terrorism Standards program, which is in the middle of a multi-year effort to approve security plans for high risk chemical plants in the United States, ceased most operations last week as a result of the congressional stalemate over fiscal 2014 spending and health-care reform, Global Security Newswire reported. Congress has yet to permanently authorize the CFATS program, so the failure to pass a spending bill means the initiative not only lacks funds but also the legal authority to operate.

"This underscores the need for the shutdown to end, and for Congress to pass a permanent reauthorization of the CFATS program," DHS spokesman Clark Stevens said in a statement to GSN. Stevens confirmed that employees of the Infrastructure Security Compliance Division, which runs the chemical security program, have been furloughed.

However, "chemical facilities should continue to comply with the requirements of CFATS, including continuing to comply with the existing and planned security measures in any approved site security plan or alternative security program," Stevens said. A Democratic Senate aid previously told GSNthe administration is making a legal determination that it is not the intent of Congress to cancel the program, given that proposed spending bills in both chambers would have extended the initiative.

The indefinite shutdown of the program, however, is causing concern among lawmakers regarding how the government will improve safety and security in the wake of chemical disasters in Texas and Louisiana this year. The government had just begun work under an executive order President Obama issued in response to the incidents. Chief among the concerns the order was meant to address was that the DHS program was unaware of the Texas facility's existence when it exploded in April, killing 14 people and leveling nearby homes.

"Over the past few days, we have seen the harmful impact the federal shutdown has had across our nation, from furloughed federal workers to halted programs that impact millions of Americans, including our chemical security program,"  Senator Thomas Carper (D-Del.) said in a statement toGSN. "As we saw earlier this year with the tragic explosions at chemical facilities in Texas and Louisiana, it's important that we make sure that chemicals are being produced, distributed and stored in a manner that is both safe and secure."

Previously, Rep. Bennie Thompson (Miss.), the top Democrat on the House Homeland Security Committee," called the CFATS shutdown an "unconscionable … result of Republican gamesmanship."

Industry supporters of the program also had strong words. Bill Allmond, vice president for government relations at the Society of Chemical Manufacturers and Affiliates, told GSN that as a result of the shutdown, Congress would have to turn questions regarding the pace of CFATS implementation "back on itself."

Carper, who chairs the Senate Homeland Security Committee, said he would work with his colleagues to not only end the partial government closure but also to ensure that the CFATS program "isn't as vulnerable to these reckless shutdowns" in the future.

Efforts to pass legislation permanently authorizing the program have gone nowhere in recent years, however. The Republican leadership of the House Energy and Commerce Committee has effectively blocked such bills, citing concerns the program has not completed site inspections and security plan reviews fast enough.

Labor and environmental groups, meanwhile, have argued the program lacks the teeth needed to ensure facilities are safe and secure, and have called on the Environmental Protection Agency to fill the perceived void -- a prospect strongly opposed by industry officials.

Early in July, DHS program head David Wulf argued the initiative had "turned a corner." He noted that as of last July, the effort had only given preliminary approval to 50 site-security plans, conducted only 10 inspections and had not granted final approval to single security plan since the CFATS program was first authorized by Congress in 2007.

One year later, the program had preliminary approved "upwards of 500" security plans, conducted more than 50 inspections and granted final approval for 160 plans, he said.

However, later the same month, House Republicans hinted this was not good enough. In a July 22 letter threatening to try to reduce funds for the program, GOP lawmakers complained of a "backlog of approximately 3,120 facilities" where security plans still needed review.

(Image via Jiri Vratislavsky/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.