recommended reading

Chemical Arms in Panama Won't Be Sent to U.S. for Disposal, Pentagon Says

The Visual Explorer/Shutterstock.com

The Defense Department on Tuesday said there are no plans to return aging U.S. chemical weapons left behind in Panama to the United States for destruction, seemingly contradicting a recent statement on the matter made by a top Panamanian official.

Pentagon spokeswoman Jennifer Elzea in released comments said the department would be dispatching a team of chemical weapons experts to the Central American nation "to assess the munitions identified by the Panamanians for appropriate future destruction options," which could include on-site incineration or chemical neutralization.

Panamanian Foreign Minister Fernando Núñez Fábrega last month reportedly announced an agreement had been reached with Washington for U.S. defense specialists to retrieve the handful of degrading toxin-filled munitions that were abandoned by the U.S. Army on San Jose Island after its chemical testing program there ended in 1947.

Núñez Fábrega was reported to have said in a statement posted online Nov. 21 that the intention was for the weapons to be transported to "the New Mexico desert, where they will be buried."

However, Elzea said the notion of sending the chemical arms back to the United States is not on the table.

"Relocation of the munitions from Panama to the Unites States is not an option being considered by the United States government, nor is it an option being discussed between the two countries," she said.

The Pentagon statement did not cite a time frame for when the experts would be going to the country.

The method of weapons destruction would depend on the type, number and condition of the munitions, Elzea said.

Panama City has pushed for years for Washington to dispose of the chemical weapons, arguing that San Jose Island's touristic value cannot be realized as long as the corroding munitions are there, posing a potential threat to public health.

The munitions on the island are thought to contain mustard agent and phosgene.

(Image via The Visual Explorer/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.