Around Government

Larry Downing/Landov

Back in the Saddle

Therapy programs pair horses and healing for wounded veterans.

Air Force veteran Alicia Watkins lost everything after she returned from tours of duty in Afghanistan and Iraq and isolated herself from friends and family. She was homeless and living in her car when she accepted an invitation to Join-Up, an intensive three-day program in Solvang, Calif., that pairs abused and neglected horses with self-isolated veterans with post-traumatic stress disorder. 

“Horses are flight animals,” Monty Roberts, creator of Join-Up, told the American Forces Press Service. “If they don’t trust it, they need to get away from it. That’s how a veteran feels, too.”

Training horses often involves using violence to force them into submission. Roberts prefers a nonviolent training style he calls “gentling” or “natural horsemanship.” The program is based on trust. “The horses we see that were traumatized and abused never forget it,” he says. “But you can mask it over with good behavior, and that’s the same
with veterans.”

Watkins found relief among the Join-Up participants—both the horses and the other veterans—who understood her suffering and shared her desire to heal. 

More than 30 Veterans Affairs Department medical centers also provide equine-assisted therapy to wounded warriors. These six- to 12-week programs match vets who have identified specific goals with trained therapy horses. Veterans begin with grooming their horse and nurturing communication skills then riding on trails. The veteran and the horse gradually become a herd of two. 

- Jean Fogarty

Upward Mobility

Created in 1978, the Senior Executive Service was envisioned as a mobile corps that would bring excellence across agencies, a study by the Partnership for Public Service and McKinsey & Co. noted, but nearly half its members have never changed jobs.

Trip Tips

With the recent uproar over what feds are up to on business trips, it might be time to review the Federal Travel Regulation, most recently updated in December 2011. 

The only people authorized for temporary duty travel allowances are government employees, interviewees and family members who are “temporarily located to safeguard their lives.” So think twice before inviting your spouse along to Las Vegas on the taxpayers’ dime.

Guidelines instruct agencies to “identify opportunities to reduce costs in selecting a particular conference location and facility.” Try to identify those opportunities prior to your eighth preplanning trip.

Employees are prohibited from using a government-issued charge card for personal reasons while on official travel. If you’re looking for a little local nightlife, you’ll have to pay for it yourself.

Yes, hungry feds, “light refreshments” are allowed. Examples in the guidelines include: cookies, pretzels and soft drinks, not artisan cheese trays or $4 shrimp.

Penalties for defrauding the government can include a fine of up to $10,000 and imprisonment up to five years. This might seem self-explanatory, but you’d be

- Andrew Lapin

Tech Savvy Response

Thad Allen shares lessons learned after the BP oil spill.

Two years after an oil rig explosion roiled the Gulf of Mexico, Government Executive caught up with retired U.S. Coast Guard commandant Adm. Thad Allen, who led the federal response. Now at Booz Allen Hamilton, he shared his perspective on social networking’s role during crises. 

How he used new media to help after the BP well blowout: 

Rather than let false rumors of containment or contamination go viral, Allen propped up a website that streamed BP’s live video from the scene to counter misinformation. A joint information center tracked Tweets and other social media around-the-clock. It is less painful to be transparent from the outset than to disclose information later, he adds. “You can suffer, you can try to adapt or you can try to manage what’s going on,” Allen says.

How data analysis has changed since he graduated from the U.S. Coast Guard Academy in 1971: 

Information sharing has moved light years beyond the radio teletype that Allen used in the early 1970s. Even in 1977, “every workstation had four computers” at the El Paso Intelligence Center in Texas, where he was assigned to drug smuggling cases. But the setup engendered trust, Allen notes. “Trust is an automatic byproduct of just trying to get together and get the job done.”

Next, government should try customizable home pages to exchange real-time intelligence, he says. Legislation now requires the Pentagon to make public the coding for the National Security Agency’s Ozone Widget Framework, a tool similar to iGoogle. The framework creates a Web portal that aggregates analytical tools pertinent to a mission, in the way that the Google app displays live news feeds and other updates. “If they can do it in the military, it begs the question of why can’t they do this in places like the Southwest border.        

-   Aliya Sternstein

Virtual Visionaries

Imagine being able to view the Smithsonian Institution’s trove of more than 100 million artifacts without stepping foot in its 19 museums. Techies in the Smithsonian’s Digitization Program Office are using a newfangled scanner and printer to create 3-D printed replicas, like this Thomas Jefferson look-alike, for display online or off-site. Still a fledgling effort,the program has a long way to go. But it’s literally history in the making.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.