Pushing the integration envelope

E Pluribus Unum, the motto adopted at the republic's founding to suggest the melding of many into one, could also serve as the guiding principle for the Homeland Security Department.

In January 2003, 22 federal agencies and programs were formally assigned to DHS. A little more than a year later, the department and its contractors are immersed in the task of building one organization out of many. The effort will rely on information technology to unify DHS' component agencies. But the process of bringing together 190,000 employees means DHS officials must grapple with cultural issues as well as servers, software and networks.

Government and industry sources acknowledge that turf battles will make DHS' integration challenging, to say the least. Technical obstacles include a bevy of legacy systems and the need for secure communications within DHS and between the department and other federal agencies. The Bush administration called the creation of DHS the "largest government reorganization since the 1947 launch of the Defense Department, National Security Council and CIA." One might also call it an integration assignment for the ages.

DHS watchers say the department is borrowing heavily from industry as it takes on its integration chore.

"They want to learn all the lessons they can learn from the commercial and enterprise realm," said Greg Akers, senior vice president and chief technology officer for Cisco Systems Inc.'s Global Government Solutions unit. "They have thought about [DHS integration] as a merger of companies more than a merger of government agencies in some ways."

That merger will be a bit like changing tires on a moving vehicle. DHS must continue to operate systems while it recasts itself as an integrated entity and builds a common IT infrastructure. To facilitate this process, officials have created a stepwise transition strategy, said Lee Holcomb, chief technology officer in DHS' Office of the Chief Information Officer.

For example, one step is to address quick hits, such as the multiagency Terrorist Screening Center, which is creating a database that will combine various terrorist watch lists. In the rationalization step, DHS officials will determine which of the department's existing solutions are critical and need to be retained. Meanwhile, they will begin to move toward common solutions in the stabilization step. And the optimization step will involve the deployment of optimized capabilities.

"It's an incremental process," Holcomb said, "but we've set some strong timelines." For example, officials would like to see a DHS-wide data communications network in place by December. Other priorities for the year include designing an integrated back-office solution and fleshing out the initial take on an enterprise architecture plan. To put the technology projects on a firm business footing, DHS officials may

employ process-improvement tactics that differ from previous government efforts.

The agency is also breaking with federal tradition in its procurement style. For example, solicitations coming out of DHS lean toward performance-based contracting, an approach offering greater flexibility for fielding complex solutions.

DHS established a road map for integration in October 2003, taking the wraps off the initial version of its enterprise architecture. The architecture is designed to help it build a departmentwide infrastructure and identify areas for consolidation.

The first version of the enterprise architecture covers business, data, application and technical reference model layers. The architecture was assembled in a short time frame so "we weren't able to go deep," Holcomb said. This year, however, DHS officials plan to delve deeper into each layer, he added. In the data layer, for example, the department will provide more depth to the model in four business areas — terrorist information, financial, human resources and alerts/warnings.

Dennis Wisnosky, president and chief executive officer of business process consultant Wizdom Systems Inc., said such enterprise architectures are high-level documents that provide a starting point but little else. "They need to follow it up with getting people together from each of the groups" within DHS, Wisnosky said. That's the plan officials have in mind as they add depth to the basic framework with the help of contractors.

"We're moving from mile-wide and inch-deep into the detail," said Karl Kropp, DHS enterprise architecture program manager at Science Applications International Corp., which helped DHS draft its enterprise architecture. The objective is to make the enterprise architecture "something that is actionable," he said.

Another source of refinement is a newly launched effort to develop departmentwide requirements for back-office technology. The requirements analysis will pave the way for DHS' upcoming Electronically Managed Enterprise Resources for Government Efficiency and Effectiveness (Emerge2) procurement. Emerge2 will provide the foundation for DHS' back-office infrastructure, spanning such areas as finance, payroll and procurement.

Of the IT stabilization programs, Emerge2 "is one of the high priorities," Holcomb said, adding that it, as well as mission-oriented applications and quick-hit projects, represents an opportunity to flesh out the enterprise architecture. A request for proposals is expected in May with an award to follow this summer. A phased implementation will likely run through fiscal 2006.

But before that happens, the requirements of numerous DHS components must be assessed. BearingPoint Inc. is taking on that job under a task order awarded through the General Services Administration's Management, Organizational and Business Improvement Services (MOBIS) schedule. BearingPoint officials will document the functional business requirements for a departmentwide resource management solution set.

"The notion is to get all of the disparate agencies and components of DHS into a consolidated solution

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group