Government Work

The federal sector is the one place no one seems to want job creation.

When he unveiled his $787 billion economic stimulus package a year ago, President Obama declared its goal would be to "save or create 3 to 4 million jobs over the next few years." By the end of the 2009, with the unemployment rate still in the double digits, he acknowledged how difficult the task was. "Even though we've reduced the deluge of job losses to a relative trickle," he said, "we are not yet creating jobs at a pace to help all those families who've been swept up in the flood. There are more than 7 million fewer Americans with jobs today than when this recession began."

Obama's stimulus measure aimed to spur private sector job growth using a variety of levers, from tax incentives to federal grants and contracts.

The last time the government faced a crisis of these proportions, the president took a similar approach. Franklin Roosevelt launched the Public Works Administration to leverage federal funds to push companies to boost hiring. But when that failed to jump-start job growth, Roosevelt took a very different tack. As Charles Peters, founding editor of the Washington Monthly, wrote in Newsweek in November 2009: In the winter of 1933-34, Roosevelt put Harry Hopkins in charge of the Civil Works Administration, with orders to build a huge government program to directly employ Americans.

Hopkins put 4 million people on the federal payroll in two months, working on projects from building outhouses to producing works of art.

That was a pretty high-risk proposition, even during the Great Depression. In early 2009, Peters and Timothy Noah noted in Slate that Roosevelt ordered Hopkins to shut down the CWA before the congressional elections of 1934, fearing it would cost him Democratic seats in Congress. Today, even Obama's proposal to give the government an indirect role in job creation has been derided as "socialism."

These days, there is simply no constituency for an expansion of government jobs. To be sure, as Alex M. Parker notes in this issue, Obama has pledged to "insource" key federal positions that have been farmed out to the private sector over the past decade, but they amount to a drop in the federal bucket.

Indeed, the government has contracted out functions so assiduously that it no longer has a handle on how many people are actually working on its behalf, or exactly what they do. Now Obama has ordered agencies to try to figure that out and to develop long-term plans for managing a multisector workforce.

That's a tacit acknowledgment that agencies need to permanently adjust to a world in which their job is largely to manage the work of contractors. Which is fine, as long as we acknowledge it also takes bold options for addressing unemployment off the table.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.