Connect with us

Politics

Public Service Recognition Week comes as many feds face difficult career decisions

Published

on

Each year, Public Service Recognition Week is a time to show civil servants support for the often under-recognized and incredibly difficult task of delivering services to the public — like the Social Security employee who’s processing a mountain of paperwork to distribute benefits, or the HR specialist who’s managing the complicated requirements involved in shuffling federal employees into, out of and between positions.

But the recognition federal employees are receiving this week is cast against a much darker backdrop this year. It comes as the Trump administration attempts to significantly shrink and reconfigure the federal workforce at a pace and scale not seen in recent memory, maybe ever.

As a result, federal employees have been heading for the exits in droves — either by choice or by force. The administration fired tens of thousands of probationary employees, then later reinstated them, then reversed course once again. And agencies are in the process of eliminating a number of federal positions as part of reductions in force (RIFs), all under the directions of the White House.

At the same time, many federal employees are grappling with the nearly impossible decision of whether to leave their jobs on their own terms through the relaunched deferred resignation program (DRP) or stick it out in the hopes that their positions are still standing after RIFs take place across agencies.

Back in February, about 75,000 federal employees governmentwide applied for the first round of the DRP, according to the Trump administration. But the number of second-round DRP applications, as well as those being accepted into the program, have without a doubt gone up — although we don’t yet know the final tallies.

In an online survey conducted in April, Federal News Network heard from more than 4,500 federal employees on either why they decided to apply for a deferred resignation through their agency, or why they chose to “hold the line.” Out of the survey respondents, nearly 40% said they applied for the DRP at their agency, agreeing to quit their jobs now in exchange for several months of pay. Federal News Network’s survey is non-scientific, meaning that the results do not necessarily reflect the actual numbers of federal employees applying for the DRP.

Source: Federal News Network April 2025 deferred resignation survey of about 4,500 federal employees. The survey is a non-scientific survey of respondents who were self-selected.

With the Office of Personnel Management’s governmentwide “fork in the road” offer earlier this year, many employees said they didn’t apply for a deferred resignation for a number of reasons. Many didn’t trust OPM to follow through on the offer. Others said it felt like they were giving into the Trump administration’s wishes. And still others wanted to keep their jobs out of dedication to their agency’s mission.

Whatever the reason may have been, our survey results showed that nearly 70% of respondents did not consider taking a deferred resignation and did not apply for it in the first round of the offer.

But now reading the tea leaves more closely, many more employees have chosen to exit their jobs on their own terms, rather than face a possibility of being forced out anyway in a RIF. About 70% of respondents in Federal News Network’s survey said they are seeing more of their colleagues take the DRP in the second round.

deferred resignation surveySource: Federal News Network April 2025 deferred resignation survey of about 4,500 federal employees. The survey is a non-scientific survey of respondents who were self-selected.

“A sinking ship”

The reasons more federal employees now want to apply for the DRP, however, still vary greatly. The survey results show a combination of federal employees who were worried about RIFs, burnt out from the growing pressure coming from the Trump administration or whose initial reservations about the legitimacy of the DRP have been alleviated.

“By now, more employees might have had the time to fully understand the program’s benefits and conditions, making them feel more confident about their decision,” one survey respondent observed. “Any initial skepticism about the program might have faded as employees saw that the promised benefits were delivered to those who participated in the first round.”

In the first round of the deferred resignation program, some saw the risk of leaving as greater than the risk of staying. Now, that feeling has reversed for many.

“People are seeing the reality of the RIF happening in front of them in different parts of the agency and it has become very real,” one employee noted.

Many respondents felt that applying for the second round of the DRP kept their decision in their own hands, rather than leaving it to the agency to determine whether they’d keep their positions. As one survey respondent put it, in comparison to an agency RIF, the DRP is “the lesser of two evil options.”

“I initially thought it was too risky to take the DRP when it was first offered. I believed I’d be able to keep my job,” another respondent wrote. “However, by the time the second DRP was offered, I realized how unstable the government was and that I might lose my position.”

Another respondent wrote, “People were more desperate and afraid of losing their jobs after seeing what happened to the probationary employees. The nature of our work and the makeup of the federal government are changing, and many people were not willing to stay aboard what they perceive as a sinking ship.”

And like many feds these days, one respondent said they made the tough choice to leave public service after spending 20 years in the federal workforce.

“Morale is low and stress is high. Work volumes will increase for those who remain. The daily grind in the current environment is not worth it anymore,” the respondent wrote. “After all, we were just dismissed and made to feel replaceable despite so much dedication to our public service mission for many years.”

Dedication to public service holds strong

Depending on where federal employees are in their career also appears to have an influence on their decision to apply for the second round of the DRP. In the survey, many employees close to retirement, as well as many within the first few years of their careers, saw themselves as ones on the cusp of the finish line, or ones who would be the first to go in a RIF.

“I’m close to retirement anyway and the administration is destroying my agency,” one respondent wrote.

Another said, “I was already terminated as a probationary employee and was confident that I would be terminated during the upcoming RIF.”

Those in the middle of their careers — who are still a ways away from retirement, but tenured enough that they have a better chance of surviving a RIF — may be more likely to choose to stay in their jobs for the time being.

Still, it may be a while before there’s a complete picture of how many federal employees chose to leave their jobs, and for what reason. Many agencies are still sifting through the deferred resignation paperwork to determine who will be accepted into the program, and who will be considered ineligible.

But at least at one agency, the numbers are incredibly telling. The IRS received deferred resignation applications from a whopping 22,000 employees — about one-quarter of the agency’s entire workforce. The IRS later denied about 10% of the employees who applied for the DRP offer. That leaves some 20,000 employees who are expected to walk out the door.

Despite many feds vacating their positions, many others are choosing to stay and weather the storm. That decision also has a wide variety of reasons behind it — some spoke of a need for financial stability or concerns about a tumultuous job market.

But in what feels like an homage to Public Service Recognition Week, federal employees who are staying put said they are choosing to remain hopeful about the future of the civil service and continuing to serve the public as they have for years.

One federal employee who took the survey said they are staying “simply because I don’t want to resign from public service. I refuse to let threats and harassment rule my decision-making about my career.”

Another employee wrote, “I am a public servant and while times are tough, I’m committed to my job and public service.”

And still another respondent said, “It was a tough decision, and I’ve been swinging back and forth for days about what to do. But ultimately what tipped the scale is that I do take pride in my work, and walking away from that was a heartbreaking thought, even with everything I’m being put through.”

The post Public Service Recognition Week comes as many feds face difficult career decisions first appeared on Federal News Network.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Politics

CISA must shift cyber defense toward a holistic endpoint protection and prevention strategy

Published

on

By

Protecting critical infrastructure from ransomware and advanced cyberattacks is proving to be challenging across all sectors in the United States. In fact, these cyberattacks are growing in sophistication and are employing stealth techniques against common detection capabilities to remain undetected. The emergence of ransomware-as-a-service (RaaS) creates an elaborate ecosystem for leasing out malware and malicious software to affiliates and cybercriminals for profit. This allows ransomware actors to scale to increase profits and maximize their attack reach, while minimizing effort for ransomware developers. In fact, cybercriminals and nation state actors are blending and adopting tactics and techniques of each other, where espionage and cybercrime converge. What is common to both threat groups are evasion techniques, increasing the ability for these threat actors to remain in stealth mode, which makes it more difficult to detect.

Ransomware requires more protection

Cybercriminals who use RaaS can infect more victims, demand more ransoms, and improve their tactics to stay ahead of detection capabilities. According to Chainalysis, the Dark Angels ransomware group received the largest ransomware payment ever at approximately $75 million in 2024. Disrupting ransomware and advanced cyberattacks is imperative for national security. To do so will require industry to shift toward a holistic endpoint protection and prevention strategy that starts with endpoint privilege management (EPM). Why EPM? Because it is more resilient against ransomware and advanced cyberattacks, providing better protection capabilities to reduce the attack surface on endpoints. Endpoint detection and response (EDR) performance and detection against ransomware and advanced cyberattacks have failed to protect government agencies as cited in the Cybersecurity and Infrastructure Security Agency’s Red Team Assessment report. Moving to a holistic endpoint protection and prevention strategy will help shore up cyber defense for cyberattacks targeting critical infrastructure.

Threat actors bypassing EDR

Curated threat intelligence from MITRE ATT&CK and other threat intelligence sources have shown increasing use of advanced malware called EDR killers designed to evade, disable and manipulate EDR systems. EDR killers employ a range of techniques including terminating EDR security-related processes, tampering with EDR agents, DLL unhooking and API hooking, process hollowing and unloading kernel drivers. These evasion techniques pose a significant risk to critical infrastructure and government agencies responsible for critical infrastructure protection, rendering EDR capabilities ineffective and unreliable. Another common evasion technique highly weaponized by threat actors is living-off-the-land (LoTL) attacks that leverage native systems tools, trusted software and operating system (OS) utilities, such as PowerShell, Windows Management Instrumentation (WMI) and schedule tasks that are whitelisted by EDR.

Complimenting EDR with EPM protection capabilities is essential to combat highly sophisticated threat actors’ behaviors and activities. Understanding these gaps and issues in state-of-the-art practices is critical for elevating cyber defense with the right protection measures to boost cyber resiliency against evolving threats.

EDR leaves gaps in endpoint resiliency

Boosting cyber resiliency early in the ATT&CK lifecycle will disrupt threat actors’ capabilities and prevent them from increasing their foothold by evading detections and gaining privilege and persistence to move through the ATT&CK lifecycle. Early detection, which requires a more proactive approach, can prevent data exfiltration and impacts such as distributed denial of service, data destruction and encryption that are common with ransomware attacks. Shifting to a more proactive approach requires industry to rethink and adjust their endpoint security strategy that is less reliant on reactive capabilities associated with EDR capabilities. EDR by design focuses on detection and then prevention, which means it must accurately detect maliciousness before it can prevent the threat. That is good for common threats, but novel and sophisticated threats require longer attack chains before EDR can gain confidence.

This was demonstrated by security researchers who analyzed MITRE ATT&CK evaluation results over multiple years using whole-graph analysis to measure the performance of EDR systems. Specifically, various aspects were analyzed to include detection coverage, detection confidence, detection modifier, data source, etc. Security researchers identified the following gaps in EDR capabilities:

  1. Enhanced attack correlation — Many EDR systems still rely on detecting isolated events, and do not properly utilize comprehensive correlation to better understand and contextualize complex attack patterns. This limits the visibility in detection of multi-step and stealthy attack scenarios, which severely hamper response capabilities.
  2. EDR systems struggle with advanced techniques — Threats that employ techniques that use living-off-the-land and advanced evasion require more sophisticated correlation from EDR systems.
  3. Cross-host correlation is inconsistent — Many EDR systems struggle to detect lateral movement and coordinated attacks that span across multiple endpoints.
  4. EDR systems too Windows-centric – A large percentage of EDR systems do not support Linux-based endpoints; if they do, they result in low detection and protection results.
  5. Detection quality needs improvements — The variability in detection quality is essential for good coverage and detection. It is important to reduce the occurrence of low-quality alerts that can attribute to a considerable number of false positives — alert fatigue is real.

Cyber defenders must understand gaps in their overall security posture and develop strategies to elevate their cyber defense. To do that, a holistic endpoint strategy is needed to help reduce the attack surface on endpoints by managing privileges at the individual, user group and application levels. In the context of zero trust, no end user has privilege access by default. Privilege access is granted using just-in-time (JIT), to ensure just enough access, on an as-needed basis.

Closing gaps left by EDR

Enforcing least privilege, JIT and just enough access capabilities with endpoint privilege management provides protection and prevention capabilities that EDR lacks and cannot perform natively. These protection and prevention capabilities are designed to restrict elevated rights and control application execution. Implementing EPM with EDR allows critical infrastructure and government agencies to achieve stronger endpoint resiliency.

  • EPM reduces the noise by limiting user privileges and application execution, which allows EDR to improve accuracy and threat detection.
  • EPM limits the scope of potential damage, which allows EDR to focus on investigating and remediating specific threats to accelerate incident response.
  • EPM prevents tampering with EDR agents by removing standing privileges and stopping privilege escalation attempts, which ensures EDR can continue to operate on a compromised endpoint.
  • EPM contextualizes users and applications with elevated privileges, which improves threat hunting, enabling security teams to prioritize and investigate most likely threats.

CISA has been tracking ransomware actors and various techniques used to bypass and evade EDR. As part of their #StopRansomware campaign, CISA has been diligent about providing threat intelligence to the community with respect to tradecraft used by threat actors. CISA within the last four months has updated or released advisories for some of the top ransomware gangs outlining their ATT&CK techniques used in the wild.

  • Play (Advisory updated June 4, 2025)
  • Rhysida (Advisory updated April 30, 2025)
  • Medusa (Published March 2025)
  • Ghost aka Cringe (Published February 2025)

The table above highlights the evasion and bypass techniques that were used and have been associated with ransomware attacks. Threat actors are actively using LoTL and bring-your-own-vulnerable-driver (BYOVD) more in their attack arsenal. This illustrates the growing use of EDR evasion and bypass techniques by popular and active ransomware, but also demonstrates the need to complement other endpoint protection capabilities like EPM to boost endpoint resiliency. This echoes CISA’s Red Team assessment report, citing that the red team excelled in bypassing EDR solutions by avoiding the use of basic “known-bad” detections the tools would capture. In fact, the report further states that EDR detected only a few of the red team’s payloads in the organization’s Windows and Linux environments.

Defining a holistic endpoint protection and prevention strategy

A holistic endpoint protection and prevention strategy leaves no privileges behind. Privileges that are left behind become prime attack vectors that threat actors use to bypass and evade detection capabilities deployed in the environment to establish persistence and move laterally. Industry must pivot from a single point of failure with EDR, to a more holistic approach that not only enhances and protects EDR but can disrupt threat actors early in the ATT&CK lifecycle by enforcing privilege management to reduce the attack surface and harden the endpoint system. Enforcing least privilege, JIT and just enough access capabilities with endpoint privilege management provides protection and prevention capabilities that EDR lacks and cannot perform natively. EPM embraces foundational zero trust principles and concepts which will allow government agencies to mature their zero trust, while elevating their cyber defense.

Kevin E. Greene is chief security strategist for the public sector at BeyondTrust.

The post CISA must shift cyber defense toward a holistic endpoint protection and prevention strategy first appeared on Federal News Network.

Continue Reading

Politics

RFK Jr. Drops a Mega Bombshell on mRNA Vaccine Technology (VIDEO)

Published

on

By

This article originally appeared on vigilantfox.com and was republished with permission.

In a move that many were hoping for but were not expecting, HHS Secretary Robert F. Kennedy just announced that BARDA will be CANCELING 22 mRNA vaccine development contracts, saving taxpayers about $500 million in the process.

This move delivered a major blow to the biomedical industrial complex, which was hoping to make an mRNA vaccine for just about every disease imaginable.


https://www.thegatewaypundit.com/wp-content/uploads/2025/08/foxs-video-aug-5-2025-veed-3.mp4

The reason for this move is grounded in what happened during the COVID debacle, which Kennedy explained in detail.

First, he shared how “mRNA vaccines don’t perform well against viruses that infect the upper respiratory tract.”

“mRNA only codes for a small part of the viral proteins, usually a single antigen. One mutation, and the vaccine becomes INEFFECTIVE,” Kennedy said.

The next revelation was a big surprise.

Kennedy confirmed that the COVID shots could have CAUSED the mutations and EXTENDED the pandemic altogether.

https://www.thegatewaypundit.com/wp-content/uploads/2025/08/foxs-video-aug-5-2025-veed-3.mp4

He explained:

“The [mRNA] vaccine [platform] paradoxically encourages new mutations and can actually prolong pandemics. As the virus constantly mutates to escape the protective effects of the vaccine, millions of people, maybe even you or someone you know, caught the Omicron variant despite being vaccinated. That’s because a single mutation can make mRNA vaccines ineffective.”

Kennedy’s comments echo what vaccinologist Dr. Geert Vanden Bossche and the “conspiracy theorists” have been saying for the better part of four years now.

He warned, “You are generating a breeding ground for even more infectious variants to replicate” when you vaccinate DURING a pandemic.

https://www.thegatewaypundit.com/wp-content/uploads/2025/08/video_2025-08-05_18-40-51.mp4

With the conclusion that mRNA shots are ineffective against respiratory viruses, prolong pandemics, and encourage mutations, Kennedy declared:

mRNA technology poses MORE risk than benefits for these respiratory viruses.”

As such, Kennedy announced that BARDA (Biomedical Advanced Research and Development Authority) will be CANCELING 22 mRNA vaccine contracts, saving taxpayers “just under $500 million” in the process.

He clarified that this isn’t a complete indictment of mRNA technology across the board, but when it comes to respiratory diseases, he believes it offers no benefit to humanity.

“That’s why we’re moving beyond the limitations of mRNA for respiratory viruses and investing in better solutions,” Kennedy said.

Thanks for reading! I hope this brought you the good news you needed today.

I was banned from Twitter 1.0 three times for sharing information that Kennedy just confirmed.

Like many others, I was labeled a “conspiracy theorist.” Turns out, we were right all along.

File:TinFoilHat002.jpg - Wikimedia CommonsImage: Wikipedia Commons

Find more stories like this at VigilantFox.com

The post RFK Jr. Drops a Mega Bombshell on mRNA Vaccine Technology (VIDEO) appeared first on The Gateway Pundit.

Continue Reading

Politics

Marjorie Taylor Greene Unloads on the GOP, H1B Immigration, Foreign Aid to Ukraine, Israel

Published

on

By

Congresswoman Marjorie Taylor Greene has publicly criticized President Donald Trump over immigration policy and foreign aid.

Greene responded to Trump’s tariff announcement on India by urging an end to H1-B visas that she claims replace American jobs. Greene also called for stopping funding and weapons to Ukraine in its conflict with Russia.

Greene stated that continued U.S. funding for Kiev betrays the majority of Americans who voted to end foreign wars.

She highlighted Trump’s 2024 election win as a mandate against such involvement. The congresswoman warned that supporting these policies risks losing younger voters permanently.

On the Israel-Gaza conflict, Greene described Israel’s actions as a “genocide” and condemned the starvation in Gaza. She became the first Republican lawmaker to use this term publicly.

Greene emphasized that innocent Palestinian lives, including children and Christians, should not be devalued compared to Israeli ones.

Greene expressed surprise that more conservative colleagues have not spoken out against U.S. support for Israel’s offensive operations.

She argued that funding such wars contradicts a biblical mandate and America’s interests.

The congresswoman clarified her support for Israel’s existence while opposing involvement in its conflicts.

Trump has acknowledged the humanitarian crisis in Gaza, noting visible starvation among children despite Netanyahu’s denials.

He mentioned his wife Melania’s distress over images from the region. This marks a softening in Trump’s stance amid ongoing hostilities nearing two years.

Greene’s positions reflect broader shifts in U.S. opinion, with approval of Israel’s Gaza actions dropping to 32 percent per Gallup polls.

Republicans under 50 now view Israel more negatively than positively, according to Pew surveys.

Figures like Steve Bannon and Tucker Carlson have also criticized Netanyahu’s government.

The congresswoman has voiced growing frustration with the Republican Party’s direction. She questioned whether the GOP is leaving her or if she no longer relates to it.

Greene stated she does not want involvement in the party’s current course on foreign policy and spending.

3Greene warned Trump about delivering on promises like Epstein file transparency to retain base support. She referenced past divergences, including on AI policy in Trump’s “Big Beautiful Bill.” Despite these splits, Greene affirmed her commitment to America First principles.

Greene suggested her political future may not rely on party establishment backing. She expressed confidence in winning support from Georgia voters independently. However, the congresswoman indicated no plans for higher office in 2026.

The post Marjorie Taylor Greene Unloads on the GOP, H1B Immigration, Foreign Aid to Ukraine, Israel appeared first on The Gateway Pundit.

Continue Reading

Trending