INTELLIGENCE FILE Dodging the Budget Ax

The intelligence community is bracing for spending cuts.

When Congress and the White House reached a hard-fought agreement to raise the debt ceiling in August, intelligence officials had little reason to celebrate. The deal centers on future budget cuts, hundreds of billions of dollars of which could come from defense and national security programs.

It's not clear which sacred cows could be led to slaughter; in fact, there's nothing in the new law that says precisely how much Defense Department spending must decrease. (Defense comprises by far the largest portion of the $80 billion annual intelligence budget.)

Arguably, the law could have mandated even deeper cuts than it does. But a new committee of lawmakers is looking for as much as $1.5 trillion more in deficit-reducing savings, and what they spare from Defense or military accounts, they could easily take from costly and perhaps nonessential spy agency programs. The Homeland Security Department's budget also could end up on the block, under the terms of the deal.

Intelligence officials were preparing for this moment long before the debt ceiling debate consumed Washington. In May, the Intelligence and National Security Alliance, a professional organization for current and former intelligence employees, issued a report that warned against excessive cuts, particularly to counterterrorism operations. Their argument was that although al Qaeda has been weakened in recent years, the wars in Afghanistan and Iraq are winding down, and Osama bin Laden is dead, this is still not the time to turn back the tide of ever-rising budgets.

The intelligence community has fought this battle before. The post-Cold War "peace dividend" led to a reduction in human intelligence gathering, which didn't help the CIA and other agencies' efforts to track bin Laden in the run-up to the Sept. 11, 2001, terrorist attacks. One should expect frequent allusions to that fateful period in history during the coming months as intelligence advocates face off with a deficit committee that is required to close its deal by Thanksgiving.

Intelligence spending is predictably cyclical. In times of relative peace, money dries up. Policymakers tend to fund espionage only when they feel like they need it. Agencies have no visible constituency-after all, the work they do is mostly secret. And the mantra "Support the troops" doesn't naturally encompass spy masters and analysts, even if the work they do is life-threatening.

For officials to stave off cuts now, they'll have to make a tight connection in lawmakers' minds between the soldier on the battlefield and the data cruncher sitting behind a computer in the safety of a base or an office building. That has never been an easy sell. It won't be this time either.

Shane Harris is a former staff writer for Government Executive and author of The Watchers: The Rise of America's Surveillance State.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.