Space Cheat Sheet: Special Report — Accelerating Defense Innovation through Lesson Learned from Commercial Space
How Information Technology Can Transform the Golden Dome Initiative
The Golden Dome missile defense system represents America’s most ambitious defense program since Reagan’s Strategic Defense Initiative. With a $175 billion price tag and the promise to revolutionize homeland defense, it highlights a critical challenge: how can the Department of Defense leverage commercial innovation while managing decades of technical debt? The answer lies in transforming our approach to information technology.
Commercial Success Stories: The IT Revolution in Space
SpaceX’s Digital-First Philosophy
SpaceX didn’t just build better rockets—they built better information systems. Their achievements stem from a fundamental IT philosophy that traditional defense contractors have struggled to replicate.
Vertical Integration Through Software: SpaceX develops approximately 80% of its software in-house, from flight control systems to manufacturing automation. This approach enables rapid iteration—Falcon 9’s flight software updates weekly, something unthinkable in traditional aerospace, where software changes typically require years of certification.
Real-Time Data Architecture: Every Falcon 9 generates 30 terabytes of telemetry data per flight. SpaceX’s IT infrastructure processes this in real-time, feeding machine learning models that predict failures before they occur. Their Starlink constellation manages over 4,000 satellites through autonomous systems that would require thousands of operators using traditional methods.
Digital Twin Technology: Before Starship flies, it exists as a complete digital model. SpaceX simulates millions of flight scenarios to test the integration of software and hardware virtually. This approach reduced development time from decades to years.
Blue Origin’s Cloud-Native Infrastructure
Blue Origin took a different path, building cloud-first from day one. Their IT achievements include:
Distributed Development: Using AWS, Blue Origin created a development environment that enables engineers across the country to collaborate on the same digital models in real-time. Their New Glenn rocket was designed entirely in the cloud, eliminating the need for physical mockups until late in the development process.
API-Driven Architecture: Every Blue Origin system exposes APIs, allowing rapid integration of new capabilities. When NASA required modifications to the lunar lander, Blue Origin’s IT architecture enabled design changes to be implemented in weeks rather than months.
Traditional Defense IT Challenges: The Weight of History
Legacy System Burden
The Missile Defense Agency operates systems with roots stretching back to the 1960s—some components trace their lineage to the original SAGE air defense system. These aren’t just old; they’re archaeological layers of technology that have been built upon each other over decades.
Programming Language Archaeology: Critical MDA systems still run FORTRAN code written during the Nixon administration. The Navy’s Aegis Combat System contains millions of lines of ADA code—a language the Pentagon mandated in the 1980s but which commercial industry largely abandoned. Finding programmers who can maintain these systems is like finding blacksmiths; they exist, but they’re expensive and increasingly rare.
Documentation Decay: System documentation is scattered across multiple classification levels and resides in different networks that can’t communicate with each other. A single system might have its requirements on SIPR, technical specifications on JWICS, and operational procedures on unclassified networks. Engineers spend more time hunting for documentation or trying to reverse-engineer legacy systems than they do modernizing.
Hardware Dependencies: Many legacy systems depend on hardware that’s no longer manufactured (or made in the United States). The Air Force maintains a “bone yard” of spare parts for systems that companies stopped supporting decades ago. When critical components fail, technicians sometimes cannibalize museum pieces to repair other equipment.
Policy Barriers to Evolution
Federal Acquisition Regulation (FAR) Constraints: The FAR’s emphasis on “lowest price technically acceptable” often favors contractors who promise to maintain existing systems rather than replace them. Modernization appears riskier and more expensive compared to incremental patches.
FISMA Compliance Burden: The Federal Information Security Management Act requires extensive documentation and testing for any system change. Upgrading a legacy system to modern standards can trigger FISMA reviews that take longer than the original development, creating perverse incentives to avoid modernization.
NIST Cybersecurity Framework: While necessary, the framework often conflicts with legacy system architectures. Implementing modern security controls on 1980s-era systems is like installing airbags in a Model T—technically possible but economically questionable.
Stovepiped Data: The Tower of Babel Problem
Each service built its IT infrastructure to solve its own problems, creating incompatible islands of capability:
Air Force: Built around air operations centers designed for centralized command and control. Their systems excel at managing airspace but struggle with real-time data sharing outside their domain.
Navy: Developed ship-centric systems optimized for blue-water operations. Aegis was designed when ships operated independently; networking multiple platforms requires extensive workarounds.
Space Force: Inherited a mix of Air Force systems and specialized space operations tools. They’re trying to create unified space domain awareness while managing dozens of incompatible ground systems.
MDA: Operates as a joint agency but relies on service-specific networks and protocols. Their systems must translate between Air Force, Navy, and Army data formats in real-time.
Policy-Driven Fragmentation
Goldwater-Nichols Unintended Consequences: The 1986 Act improved joint operations but inadvertently reinforced the development of service-specific IT systems. Each service maintained separate “Title 10” responsibilities, including its own IT systems.
Competition in Contracting Act (CICA): CICA’s requirement for competitive bidding often prevents services from adopting each other’s successful solutions. If the Air Force develops an effective system, the Navy must still compete with it rather than simply adopting it.
COIN-Era Technical Debt
Between 2001 and 2021, the Department of Defense focused intensely on counterinsurgency operations. This wasn’t just a strategic shift—it was an IT transformation that created lasting technical debt:
Tactical Over Strategic: DoD invested heavily in tactical communications and intelligence systems for small-unit operations. Strategic systems, such as missile defense, received maintenance funding but little investment in modernization.
Commercial Off-the-Shelf (COTS) Addiction: COIN operations demanded rapid deployment of new capabilities. DoD became addicted to COTS solutions that worked immediately but created long-term integration nightmares.
Network Proliferation: Each theater spawned its own networks—CENTRIXS for coalition operations, SIPR for classified communications, and JWICS for top-secret data. These networks couldn’t talk to each other by design, but the isolation became permanent.
The Compounding Effect
These challenges don’t exist in isolation—they reinforce each other:
- Legacy systems resist integration, reinforcing stovepipes
- Stovepipes prevent modernization pressure
- Technical debt accumulates with each patch and workaround
- Policies written for older technologies become barriers to newer approaches
The result is an IT environment where change is expensive, risky, and slow—the opposite of what Golden Dome requires. This underscores the urgent need for modernization in our defense systems.
Barrier Analysis: Why IT Modernization Stalls
The Middle Management Firewall
The most significant barrier isn’t technical—it’s human. Middle managers who built careers on legacy systems often resist change. They’re not obstructionist by nature; they’re protecting what works while remaining skeptical of unproven alternatives.
Program managers juggle hundreds of requirements documents but lack modern project management tools. They rely on PowerPoint and Excel because that’s what their reviewers expect. Introducing agile development or DevSecOps requires changing not just tools but entire workflows. (Author’s Note: I am not fully convinced that JIRA is the fix action tool for modern DevSecOps either.)
Architectural Opacity
Golden Dome’s lack of OV‑1 (Operational View) and OV‑2 documentation creates cascading IT problems. Without clear architecture diagrams showing data flows and system interactions, contractors build incompatible solutions. Each interceptor type might use different data formats, communication protocols, and security frameworks.
This opacity particularly impacts IT planning. How can you design networks, databases, and processing systems without knowing what connects to what? Commercial companies start with architecture; Golden Dome appears to be designing it retroactively.
Security Theater vs. Security Engineering
Classification requirements create IT nightmares. Systems that should share data can’t because they operate at different classification levels. The irony is that commercial satellites often collect better imagery than classified systems, but integrating that data requires months of security reviews.
Adaptation Strategies: Bridging the Gap
Immediate IT Wins
Containerization: Deploy applications in containers that work across different environments. If SpaceX software can run on a rocket, it can run in a DoD data center.
API Mandates: Require all Golden Dome contractors to expose APIs. No more proprietary interfaces that lock in vendors and prevent integration.
Cloud-First Development: New systems should be born in the cloud, even if they eventually run on-premises. This necessitates modern architecture decisions, with the understanding that data centers must be hosted on U.S.-controlled installations. Hosting on U.S.-controlled installations means that, regardless of the JWCC solution, it will allow the Department of War to place cloud capabilities in overseas locations.
Cultural Transformation
Digital Natives in Leadership: Promote officers and civilians who understand modern IT. The Space Force is already doing this—their youngest service members have grown up with the technology and easily grasp the concepts.
Commercial Rotations: Assign defense IT personnel to work at SpaceX, Blue Origin, or leading IT solution providers for six months. They’ll return with new perspectives and contacts.
Fail Fast Permissions: Create sandboxes where teams can experiment without fear of career damage. SpaceX blows up rockets to learn; DoD should blow up bad IT ideas early and cheaply, hence the need for Digital Twin environments to experiment.
Architectural Transparency
Open Standards: Mandate the use of open standards for all Golden Dome communications. If commercial companies can build compatible systems, competition increases, and costs decrease.
Digital Thread Requirements: Every Golden Dome component must contribute to a digital thread—a complete data picture from sensor to shooter. Digital Thread requires standardized data formats and real-time sharing, increasing efficiency in other aspects of the kill chain.
Policy Recommendations: Making IT Innovation Possible
Acquisition Reform
Modular Contracting: Break massive programs into smaller IT chunks. Instead of having one contractor build everything, let specialists compete for specific pieces. SpaceX didn’t build Starlink’s user terminals; they partnered with experts to develop them.
Performance-Based Payments: Pay for IT outcomes, not effort. If a system successfully shares data with partners, the contractor receives payment. If integration fails, they fix it at their own expense.
Regulatory Relief
Commercial Data Rights: Balancing Innovation and Investment Protection
The current data rights framework forces an artificial choice: either the government gets unlimited rights and contractors lose commercial incentives, or contractors retain rights, and the government can’t effectively integrate systems. Golden Dome needs a third option.
The Innovation Dilemma: Commercial space companies invest billions in R&D because they can commercialize their innovations, generating significant returns. Traditional defense contractors accept limited commercial rights because they’re compensated through cost-plus contracts. The Golden Dome requires rapid commercial innovation, with defense integration requirements.
Proposed Dual-Rights Framework:
- Commercial Rights Retained: Contractors keep full intellectual property rights for commercial versions of their technology. SpaceX can sell Starlink globally while providing Starshield to the DoD.
- Government Rights Guaranteed: The DoD is granted unlimited rights to use, modify, and integrate defense-specific versions of the software. This includes access to source code, modification rights, and the ability to have other contractors maintain systems.
- Technology Transfer Incentives: Create tax incentives for companies that develop dual-use technologies. If a company’s commercial investment benefits defense applications, it should receive R&D tax credits proportional to the defense benefit.
Specific Implementation Mechanisms:
- Modular IP Architecture: Require contractors to separate core commercial technology from defense-specific modifications. The commercial core remains proprietary; defense modifications become government property.
- Revenue Sharing Models: For technologies developed with government funding, establish revenue-sharing agreements in which contractors pay royalties on commercial sales back to the DoD for reinvestment in future programs.
- Open Standards Compliance: Mandate that all defense-specific modifications use open standards for interfaces and data formats. Open Standard Compliance also prevents vendor lock-in while preserving commercial IP.
Legal Framework Changes: This requires amendments to the Defense Federal Acquisition Regulation Supplement (DFARS) and potentially new legislation. The framework should be tested on the Golden Dome before being implemented more broadly.
Organizational Changes
Joint IT Task Force: Breaking Down Institutional Barriers
The current acquisition system treats IT as a support function rather than a core capability. Golden Dome requires IT-centric thinking from the start, not as an afterthought.
Proposed Structure: Establish the Golden Dome Integration Task Force (GDITF) as a joint organization with unprecedented authority:
Membership and Authority:
- Service Representatives: O‑6 level officers from Air Force, Navy, Space Force, and MDA with direct budget authority for their service’s Golden Dome contributions
- Commercial Partners: Senior technical executives from major contractors with decision-making authority, not just liaison officers
- Technical Authority: Power to mandate technical standards, reject incompatible solutions, and reallocate funding between services
Operational Framework:
- Weekly Integration Reviews: Mandatory technical reviews where all participants demonstrate system interoperability, not just a brief on progress
- Standards Enforcement: Authority to reject any system that doesn’t meet integration standards, regardless of service preferences or contractor relationships
- Budget Reallocation: Ability to move funding from non-compliant programs to successful integration efforts
Decision-Making Process:
- Consensus Building: Technical decisions require agreement from both government and commercial representatives
- Escalation Authority: Disputes that can’t be resolved at the task force level go directly to the Secretary of Defense, bypassing traditional service channels
- Rapid Prototyping Budget: $500 million annual budget for rapid integration experiments and proof-of-concept demonstrations
Success Metrics:
- Integration Speed: Time from concept to working prototype across service boundaries
- Cost Efficiency: Reduction in duplicated efforts and incompatible systems
- Technical Performance: Demonstrated interoperability in realistic test scenarios
CTO Empowerment: Technical Leadership with Real Authority
Traditional program management focuses on schedule and budget compliance. The Golden Dome needs technical leadership that can make architectural decisions with immediate implementation authority.
Proposed Golden Dome CTO Structure:
Reporting Relationship: The CTO reports directly to Gen. Michael Guetlein (Golden Dome program director) with a direct line to the Secretary of Defense for technical disputes. This bypasses traditional acquisition hierarchies that slow technical decisions.
Budget Authority: The CTO controls a $2 billion annual budget specifically for:
- Integration Technologies: Software, networks, and data systems that connect Golden Dome components
- Rapid Prototyping: Quick-turn development of critical capabilities
- Commercial Partnerships: Direct contracts with innovative companies for specific technical solutions
Technical Authority: The CTO has veto power over any technical decision that affects system integration, including:
- Interface Standards: All Golden Dome systems must use CTO-approved interfaces
- Data Formats: Standardized data formats across all sensors, processors, and weapons systems
- Security Architectures: Unified approach to cybersecurity and information assurance
Staffing Model: The CTO office should include:
- Technical Directors: Senior engineers from each service, plus commercial industry rotations
- Integration Teams: Mixed government-contractor teams focused on specific technical challenges
- Innovation Labs: Dedicated facilities for rapid prototyping and testing new concepts
Performance Metrics: The CTO’s success should be measured by:
- System Integration Speed: Time to achieve interoperability between new components
- Technical Risk Reduction: Early identification and mitigation of integration challenges
- Innovation Adoption: Rate of commercial technology integration into defense systems
Implementation Timeline: The CTO position should be established within 90 days, with full staffing and budget authority to be implemented within six months. The designation of the Golden Dome of America’s CTO requires immediate action to avoid further delays in Golden Dome development.
Legal and Policy Framework: This structure requires new DoD directives establishing the CTO’s authority and potentially legislation to ensure budget control across service boundaries. The position should be modeled on successful commercial CTOs who have both technical expertise and business authority.
These expanded recommendations address the fundamental challenge facing Golden Dome: how to achieve commercial-speed innovation within defense acquisition constraints. Success requires not just new policies but new organizational structures that prioritize technical integration over traditional bureaucratic processes.
The Path Forward
Golden Dome can succeed where Strategic Defense Initiative failed, but only if we learn from the commercial space sector. The technology exists—SpaceX tracks thousands of objects simultaneously, Blue Origin simulates entire missions digitally, and both iterate faster than traditional defense contractors thought possible.
The real challenge is institutional. We must convince middle managers that change strengthens rather than threatens their positions. We need acquisition officials who understand APIs as well as cost-plus contracts. Most critically, we need IT architectures that assume integration from the start, not as an afterthought.
The commercial space industry proved that information technology can transform hardware industries. Golden Dome’s success depends not on building better interceptors, but on building better systems to control them. The question isn’t whether DoD can adapt commercial IT innovations—it’s whether we can do it fast enough to matter.
Time is not on our side. While we debate requirements, adversaries deploy capabilities. While we protect legacy systems, threats evolve beyond their capabilities. Golden Dome represents our chance to leap ahead, but only if we’re willing to leave outdated IT approaches behind.
The blueprint exists in Hawthorne and Kent, where SpaceX and Blue Origin build the future. The only question is whether the Pentagon is ready to follow it.
October 13, 2025
Comments are closed.