Fedblog FedblogFedblog
Government Executive Editor in Chief Tom Shoop, along with other editors and staff correspondents, look at the federal bureaucracy from the outside in.

FLOTUS to Feds: You’re Invisible

ARCHIVES
Carolyn Kaster/AP

“People don’t even know you exist.”

No, that’s not some high school mean girl in Anytown, U.S.A. talking. That’s First Lady Michelle Obama speaking to Interior Department employees on Tuesday.

The line elicited laughs from federal workers in the audience, and to be fair, was couched between high praise for the department’s 70,000 employees across the country. It was Mrs. Obama’s second visit to Interior (the first was four years ago at the beginning of the president’s first term). The pep rally was especially well-timed; furloughs for the U.S. Park Police started on Sunday. Sequestration is threatening Interior employees’ paychecks, not to mention the public’s summer vacation plans.

Here’s the excerpt with the line from the White House transcript of the First Lady’s remarks:

But I also know that the work that you do isn’t easy, especially right now during these times. I know that budget cuts mean that you all are juggling even more responsibilities with fewer resources. And I know that many of you are stretched thinner than ever before. So that’s one of the reasons why it’s just as important for me to be here at the start of this term as it was to be here four years ago, because I want you to know how much Barack and I truly appreciate everything that you do. And I know you don’t hear that. People don’t even know you exist. (Laughter.) It’s so true. I mean, federal workers are this invisible face. No one knows what they do, what it means, how much they benefit us.

I bet feds wished they were more invisible when the administration was putting together its fiscal 2014 budget. Among other things, the president wants to switch to a less generous formula for calculating retiree benefits and proposes increasing the amount current federal workers contribute to their pensions.

Kellie Lunney covers federal pay and benefits issues, the budget process and financial management. After starting her career in journalism at Government Executive in 2000, she returned in 2008 after four years at sister publication National Journal writing profiles of influential Washingtonians. In 2006, she received a fellowship at the Ohio State University through the Kiplinger Public Affairs in Journalism program, where she worked on a project that looked at rebuilding affordable housing in Mississippi after Hurricane Katrina. She has appeared on C-SPAN’s Washington Journal, NPR and Feature Story News, where she participated in a weekly radio roundtable on the 2008 presidential campaign. In the late 1990s, she worked at the Housing and Urban Development Department as a career employee. She is a graduate of Colgate University.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.