Cutting Costs Cutting CostsCutting Costs
Inside the effort to improve the efficiency of federal operations.

The Ultimate Stimulus: Death Star Petition Requires White House Response

ARCHIVES
Image via Neftali / Shutterstock.com

A petition asking the Obama administration to secure funding for construction of a Death Star—the planet-destroying super space weapon that was blown up not once, but twice, during the original Star Wars trilogy (that’ll teach you to cover your exhaust ports…)—has secured enough signatures to require a response from the White House.

The request was started Nov. 14 on the White House’s We the People website. Any petition that earns more than 25,000 signatures in 30 days requires an official response from an administration official. The platform, launched Sept. 22, 2011, allows citizens to petition the government on a wide range of topics, many of which are more, let’s say, realistic.

Speaking of realistic, should the White House actually entertain the petition, how much funding would be required to build an actual planet-sized Death Star? Lucky for all of us, the mathematics Jedis over at Centives, an economics blog run by students of Lehigh University, figured it out earlier this year:

“The cost of the steel alone?” they asked. “At 2012 prices, about $852,000,000,000,000,000. Or roughly 13,000 times the world's GDP.”

That is one hell of a stimulus plan. How big?

Yesterday the students published a follow up set of calculations that showed simply mopping the floors of the Death Star in the course of a year would require the hiring of 48 million workers—or 33 percent of the American labor force.

Given its far, far out chance of becoming reality, will the White House actually respond to this petition? It wouldn’t be the first time they’ve had to issue responses to We the People initiatives that are a little…out there. Just last year Phil Larson, a White House official who works on space policy, issued a very professional response to petitions demanding the White House disclose its knowledge of extraterrestrial life.   

Next to all this, those secession petitions look a little more realistic. Regardless of the White House’s response, they should watch out--it’s probably a trap.

(Image via Neftali / Shutterstock.com)

Mark Micheli is Special Projects Editor for Government Executive Media Group. He's the editor of Excellence in Government Online and contributes to GovExec, NextGov and Defense One. Previously, he worked on national security and emergency management issues with the US Treasury Department and the Department of Homeland Security. He's a graduate of the Coro Fellows Program in Public Affairs and studied at Drake University.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.