Homeland security's second act

The idea seemed unthinkable three years ago, when the ruins of buildings destroyed by terrorists still smoldered. But it's true: A degree of normalcy has returned to the government and the country. The absence of new attacks in the United States has made such a turnabout not only possible but also probably inevitable, given the human desire to move on.

Of course, the lack of new attacks doesn't mean that the threat has disappeared — or even diminished. The country faces the same risks but in a less highly charged environment. The purpose of this special report is to explore how that changing backdrop is affecting the government's homeland security plans and priorities, and the fortunes of the companies in that new multibillion-dollar market.

It is understandable that government officials' initial response to the 2001 terrorist attacks would be to go into crisis mode, passing new laws, reorganizing agencies and re-evaluating contingency plans. Terrorism is, by its nature, an unpredictable threat. But our best defenses include better information and communication, not just more law enforcement officers on the streets. In addition, we live in a technology-dependent country, so information technology and automation naturally play a significant role in the government's response.

Officials at many IT companies, still recovering from the dot-com bubble burst and the general economic downturn, saw the government market — and homeland security in particular — as a promising and more reliable way to get business going again.

Certainly, government officials have spent a good deal of money on homeland security, with many high-profile projects supplying more than enough proof of the market's legitimacy. However, those procurements aren't enough to sustain the efforts of the hundreds of contractors who have been knocking on doors around Washington, D.C. And fewer vendors seem to be knocking these days than before.

To top it all off, analysts expect the previously rapid growth in homeland security spending to fall to more sustainable levels.

So what does this mean for the coming year and beyond? As stories in this special report illustrate, government officials have some difficult work ahead of them. However, a number of factors are in their favor: They have a more clear-headed sense of what their priorities should be, what the most promising technologies are and which investments will produce the best returns.

Tough choices will have to be made, and some projects won't get funded. However, security is not measured by the dollars spent on systems but by the effectiveness of those systems.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group