The Big Budget Crunch Awaiting America’s Spies

Director of National Intelligence James Clapper listens at center to testimony given by Director of the Defense Intelligence Agency, Lt. Gen. Vincent Stewart, far right, during the House Intelligence Committee hearing on Capitol Hill, Sept. 10, 2015.

Pablo Martinez Monsivais/AP

AA Font size + Print

Director of National Intelligence James Clapper listens at center to testimony given by Director of the Defense Intelligence Agency, Lt. Gen. Vincent Stewart, far right, during the House Intelligence Committee hearing on Capitol Hill, Sept. 10, 2015.

The U.S. intelligence community overall budget may rise in the months ahead, but spending on information technology will not, a new report says.

Since a peak funding level of $80.1 billion in 2010, the 17 agencies within the intelligence community have been forced to operate with declining dollars, down to some $66 billion in fiscal 2015.

According to a new report from market researcher Deltek, the IC’s overall budget may be on the uptick, but its spending on information technology won’t be.

That means the IC will have to meet growing threats on land and in cyberspace – particularly from China and Russia, the report notes – without the added benefit of extra tech spending.

Because the IC does not publish a public line-item budget for its IT expenditures, much of the data in Deltek’s report are based on estimates from entities like the Federal Procurement Data System.

Using this data and other sources, Deltek estimated there was about $9.8 billion in “total addressable” intelligence tech spending in fiscal 2015. The report suggests IT spending will essentially stagnate through 2020, with estimated IT spending at $9.5 billion by then — a 0.4 percent decrease from today’s levels.

“While overall spending for IT spending is expected to remain flat over the forecast period, demands related to cybersecurity, cloud, big data analytics and infrastructure modernization will encourage growth opportunities,” wrote Deltek’s principal research analyst Kyra Fussell in a blog post announcing the research.

Doing more with less is a mantra echoed by National Intelligence Director James Clapper since it became apparent that even the IC feels the tightening of overall budget squeezes.

The IC’s flagship IT initiative, the IC Information Technology Enterprise strategy—known as  ICITE (pronounced “eyesight”)—could help.

That strategy, authored by Clapper and former IC Chief Information Office Al Tarasiuk, directed agencies to share IT services when possible, rather than buy and silo their own. ICITE changed the business model for agencies, providing a unified vision to securely discover, access and share data.

In one such example, the CIA contracted with Amazon Web Services for $600 million to build a single cloud infrastructure for each IC agency to use. CIA officials cited rapid innovation and cost savings as primary drivers to a commercial cloud computing platform—albeit one behind the IC’s firewall.

Presumably a reliance on such “as-a-service” capabilities will reduce maintenance and operating costs of outdated data centers and server racks over time.

“There are indications of efficiency and potential through shifts toward as-a-service models, adopting analytics and optimizing how the IC works,” Fussell told Nextgov in an interview.

Legacy spending, Fussell said, is tricky business for the IC. That’s because turning off a data center containing petabytes or more of classified or sensitive data and relying instead on a less-proven technology like cloud can be seen as risky.

The National Security Agency began to buck this trend last year when it started closing down legacy data repositories and transitioning existing data to its own open-source cloud. That’s more an exception than the rule, though, even when new technologies come into the fold.

“They usually continue paying for their legacy systems,” Fussell said.

It’s also tough to estimate how technologies that increase efficiency and promote cost savings actually affect the IC budget, said Alex Rossino, a senior principal research analyst at Deltek.

“There is certainly some kind of impact; the problem is finding out where correlation meets causation,” he said.

Rossino added it was encouraging to see technology driving structural changes at large-scale organizations like NSA, which is undergoing a reorganization that will merge its offensive and defensive organizations.

“This is a reorganization that appears to be driven by technology as opposed to by streamlining processes,” Rossino said. “They’re bringing operators and analysts and anyone in the business side of the house together to create teams so they can glean the most insight from data analysis.”

Because of ICITE, a stagnant IT budget for the IC is not necessarily “all doom and gloom,” Fussell said, but “the margin for mistakes is getting narrower.”

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.