Army says latest funding cut will delay transformation

Senior Army officials are bemoaning a $206 million cut to their premier transformation program in the recently enacted fiscal 2008 Defense appropriations bill. The cut, according to Army Secretary Pete Geren, would have a significant effect on the Future Combat Systems and ultimately drive up costs on the transformation program, now estimated to cost $160 billion.

"I can't tell you with certainty today, but once we got word of the $200 million cut, we have gone to work to figure out how to minimize the impact," Geren told the Senate Armed Services Committee at a hearing late last week. "It will slow it down, and those delays end up costing more in the long term, so it won't save money in the long term."

In particular, the cut in this year's bill could slow development of the Non-Line-of-Sight Cannon, the first of several FCS ground vehicles the Army intends to field, as well as other systems that are in the works.

Geren said roughly $850 million in cuts imposed by Congress in the last several years have caused delays and forced the Army to revise its plans for the program, which envisions fielding a sprawling system of manned and unmanned air and land vehicles connected by an advanced communications network. Lawmakers, particularly in the House, have long been skeptical of the FCS program, the most expensive and ambitious technological endeavor in Army history.

House Defense Appropriations Subcommittee Chairman John Murtha, D-Pa., who initially cut $406 million from the Army's $3.7 billion FCS request for fiscal 2008, has said he has strong reservations about the program, which he thinks is too expensive at a time when the Army is scrambling to pay for equipment urgently needed in Iraq and Afghanistan.

Despite the wartime pressures on his budget, Army Chief of Staff George Casey appeared during the hearing to be more concerned about any potential stress on FCS accounts after operations in Iraq and Afghanistan begin to wind down. As a recent example, Casey pointed to the so-called peacetime military procurement holiday of the 1990s.

"One of the biggest challenges is . . . going to be maintaining the kind of investments when the war is over, whenever that is," Casey said. "Modernization initiatives like FCS, I think, come under particular challenge at times ... between conflicts when Americans' interests turn elsewhere, as they did in the '90s."

Casey said military leaders "need to make sure that the country focuses on the reality of the challenge and not repeat the mistake that we made in the '90s."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.