Pentagon tests IT portfolio approach

DOD hopes that bundling similar programs could lead to better project management

Defense Department leaders are testing a new approach to budgeting for the military’s multibillion-dollar information technology programs as they craft their budget requests for fiscal 2009 and 2010. That approach calls for DOD to bundle similar programs from across the services into capability portfolios.

Deputy Defense Secretary Gordon England created four panels last year to implement a process known in the department as capability portfolio management. Its purpose is to help senior leaders better understand program gaps and redundancies. With that information, program managers and others can redirect spending as needed.

DOD chartered the panels to oversee four portfolios of IT-laden projects that lack what Air Force Maj. Gen. Michael Hostage called a “joint advocate.”

“We develop…capabilities at the service level, but we fight at the joint level,” Hostage said at an industry conference in June. Hostage runs daily operations for managing the joint command and control portfolio at the Joint Forces Command.

In addition to the joint command-and-control portfolio, DOD’s test of capability portfolio management involves three other portfolios: joint network-centric operations, run by the DOD’s chief information officer’s staff and the Strategic Command; battlespace awareness, led by the Office of the Undersecretary of Defense for intelligence; and joint logistics, led by the Office of the Undersecretary of Defense for acquisition, technology and logistics and the Transportation Command.

Since their inception last fall, the four panels worked with the services to apply the principles of capability portfolio management while putting together the 2008 DOD budget request. But panel officials said their ability to affect spending decisions for next year’s budget was limited because the military services had almost finished their requests when England set up the portfolio management groups.

The 2009 budget is widely seen as the first time the portfolio managers can make a difference because they have more time and new authorities to track the military service budgets as they evolve, Hostage said.

In the fight for defense budget dollars, the services have traditionally kept internal budget information closely guarded.

Many officials see the 2009 budget drill as a warm-up for the 2010 request, which will be the last DOD plan put together by the Bush administration. In the Pentagon’s budget cycle, odd-numbered years, such as 2009, are considered off-years in which DOD officials traditionally request minor adjustments to the previous year’s request. In even-numbered years, officials craft more thorough six-year spending plans for the military’s programs.

According to observers, the coming months will show whether portfolio management officials and service officials can agree on adjustments to the service IT programs, which could amount to a reshuffling of billions of dollars. The portfolio managers have the support of senior Pentagon leaders, but the services, who own the military’s IT programs, could insist on their responsibility under the constitution to train and equip U.S. armed forces.

Ron Jost, a deputy assistant secretary in the office of the DOD CIO, said he invests in collaborating with the services early on to avoid disagreements later. Jost oversees the daily activities of the joint net-centric operations capability portfolio.

Portfolio managers can write issue papers for senior DOD leaders for cases involving irreconcilable differences with service spending plans.

“If we have to write issue papers, we failed,” Jost said. “We’re a little different in that sense.”

DOD’s experiments with capability portfolio management have attracted attention on Capitol Hill. Department officials should consider expanding the approach beyond the four experiments to include other capabilities that reach service boundaries, Senate Armed Services Committee members wrote in their June 5 report accompanying their version of the 2008 Defense Authorization bill.
A peek at DOD’s net-centric ops portfolioThe Defense Department’s joint net-centric operations portfolio comprises 37 primary programs, including DOD space communications programs, the Joint Tactical Radio System and parts of the Future Combat Systems, according to an April charter for the effort obtained by Federal Computer Week.

The group managing the portfolio has a staff of 67: three military employees, 20 civilian employees and 44 contractors. The value of the entire portfolio is estimated at more than $100 billion for fiscal year 2008 to 2013, the document states.

Here is a breakdown of the portfolio money.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group