The Fall and Rise of the CIO

In the Defense Department, the same person acts as chief information officer

and assistant secretary of Defense for command, control, communications

and intelligence (ASD/C3I). Current CIO Art Money is a political appointee

who will likely exit with the Clinton administration.

The recommendation to strengthen the CIO position is not the first attempt.

In 1997, Defense Secretary William Cohen announced plans to abolish the

ASD/C3I position, dividing its functions between departments and tapping

the undersecretary of Defense for acquisition and technology as CIO.

Cohen changed course after the move was widely denounced by experts in command

and control and information warfare. They argued that the growing dependence

on information operations on the battlefield will require a strong ASD/C3I

and CIO.

So Cohen substantially broadened the office's reach in 1998, creating a

new structure that enabled the Pentagon to develop policies and programs

by combining data from assets such as reconnaissance satellites with traditional

C3 systems.


  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.