Former Microsoft COO: Intelligence overhaul means crushing 'fiefdoms'
Otherwise, efforts to revamp government agencies could fail, he says
Computerworld - WASHINGTON -- The U.S. intelligence community has "effectively missed the information and communications revolution of the 1990s," according to Bob Herbold, retired executive vice president and chief operating officer at Microsoft Corp. And he said he knows exactly why: Cultural fiefdoms at various intelligence agencies have grown large and powerful, and have even allowed new fiefdoms to grow within them.
According to Herbold, the 9/11 Commission and the U.S. Congress -- both of which have called for a major overhaul of the U.S. intelligence community to help improve information sharing -- are up against a formidable enemy.
Herbold recently completed a book about the topic called The Fiefdom Syndrome, and his comments come as the Bush administration and Congress work to reshape the nation's intelligence gathering abilities.
"Fiefdoms emerge when individuals and groups seek to make themselves as independent as possible and work to protect their turf and reshape their environment to gain as much control over it as is possible," said Herbold. "This behavior stems from the inclination of individuals and groups to become fixated on their own activities, their own careers, their own territory or turf to the detriment of those around them."
Those who create fiefdoms become dangerously insular, losing perspective and awareness of what is happening in the world outside of their own control, Herbold said. "They lose their ability to act consistently on behalf of the greater good, [and] they are determined to do things their own way, often duplicating or complicating what should be done organizationwide," he said.
Such cultural issues mean the 9/11 Commission and its backers are likely to fail or at best only partially succeed in fostering real reform, according to Herbold. He sees indications that this is happening already.
"President Bush quickly asked Congress to appoint a national intelligence director, but without any authority to hire, fire and set budgets of the individual intelligence fiefdoms," said Herbold. But the current intelligence community fiefdoms likely remain secure, knowing that there will be numerous committees and subcommittees, all of which have authority over homeland security, fighting to protect their fiefdoms.
Two recent government reports shed light on the problem (see story). The Department of Homeland Security's inspector general last month issued a report concluding that the agency's CIO didn't have the political clout needed to pull together an enterprise architecture integrating the IT systems of the 22 agencies within the DHS.
And a separate report -- made public this week -- by the Government Accountability Office found that the DHS is still struggling to put together a plan to pulltogether its IT assets.
With those issues in mind, a series of congressional hearings this week focused on how major organizational changes to the nation's intelligent community might work (see story).
Read more about Government IT in Computerworld's Government IT Topic Center.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.