2014 Budget

IT Dashboard hints at classified IT spending in Obama budget

locked vault

The amount of money budgeted for classified IT is locked away in the vault of secrecy, but there some some clues. (Stock image)

Budget numbers posted April 12 on the federal IT Dashboard suggest that the government is spending at least $5.4 billion on classified information technology, but these numbers don't tell the whole story.

President Obama's fiscal year 2014 budget request includes about $39.6 billion for Defense Department IT spending. Overall, the administration is seeking $82 billion for IT. The summary numbers in the IT Dashboard put the defense IT allocation at $34.1 billion. A helpful footnote to a budget document explains the discrepancy, noting that, "Spending levels on information technology investments shown here for DOD include estimates for IT investments for which details are classified. Totals shown here for DOD are higher than totals reflected on the IT Dashboard, which cannot reflect classified details"

If the $5.4 billion discrepancy forms a baseline for classified IT spending, the real total is likely much higher. The overall annual government IT spend could be as high as $100 million, said Joel Willemssen, managing director of the IT section at the Government Accountability Office, in testimony before a House committee earlier this week.

"When OMB talks about the amount of money the federal government spends on IT, it's an understated figure for a variety of reasons," Willemssen said. Among those reasons, he said, are "R&D projects or space projects that include a huge percentage of IT, which are not reported," as well as spending on intelligence and other exclusions.

The fact that the government is advertising the discrepancy between classified and non-classified spending in a budget document points to "pockets of increased intelligence transparency," over the last decade says John Slye, who analyzes government spending at Deltek.

The $5.4 billion might understate classified IT spending in other ways, Slye said. The IT components of weapons systems, such as authentication and encryption systems, could be classified as something other than IT.

What's not clear at all is the extent to which agencies that come under the classified portion of the budget – the Central Intelligence Agency and the National Security Agency – get funds out of the classified portion of the defense budget. Those with the access and clearance to know are breaking the law if they share such information. Those who make inferences based on years of experience in analyzing federal budgets are just offering their best guess. But even if it's incomplete, $5.4 billion is a significant start in funding classified technology.

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy, health IT and the Department of Veterans Affairs. Prior to joining FCW, Mr. Mazmanian was technology correspondent for National Journal and served in a variety of editorial at B2B news service SmartBrief. Mazmanian started his career as an arts reporter and critic, and has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, Architect magazine, and other publications. He was an editorial assistant and staff writer at the now-defunct New York Press and arts editor at the About.com online network in the 1990s, and was a weekly contributor of music and film reviews to the Washington Times from 2007 to 2014.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group