Lawmakers urge deficit panel to back Defense cuts

House Financial Services Committee Chairman Rep. Barney Frank, D-Mass., and more than 50 other lawmakers sent a letter to the Commission on Fiscal Responsibility and Reform Wednesday describing the "urgent need" to cut excess defense spending.

Frank and other members of the Sustainable Defense Task Force, which issued a report in June outlining possible steps to cut $1 trillion out of the defense budget in 10 years, said Wednesday that excessive spending is a result of America's overextension in defense.

"We're not just talking about reform, or doing more efficiently what we already do" Frank said in a conference call with reporters. "We're talking about how we don't need to do as much" when it comes to defense, he said.

Defense Secretary Robert Gates has proposed cutting more than $100 billion within Defense's budget over the next five years and using the savings for force modernization and other high priorities. But with the massive $1 trillion national deficit, these budget hawks are arguing this step will barely make a dent.

Leaving defense off the chopping block would mean cutting into funds for Medicare or Social Security, Frank said. "I admire what Gates is doing, but we could do less when it comes to expensive military apparatus," he said.

Before the commission makes its recommendations in December, Frank said, "We need to make it clear what the tradeoffs are."

The United States has a "bloated idea of what our safety requires," said Ben Friedman, a fellow at the Cato Institute and member of the task force. "By shedding missions, the Pentagon could cut force structure, cut personnel . . . [and the] vehicles procured for them. We don't want to just reduce [our] footprint in Europe and Asia, but get ourselves out of those countries and reduce our commitments to defend them -- and have them serve as [their] own line of defense."

Proportionally, defense makes up 20 percent of the federal budget and almost 60 percent of discretionary spending, Frank said, adding that it's responsible for the 66 percent increase in discretionary spending since 2001.

"We operated for the past 10 to 15 years on the delusion of available resources and our capacity to carry debt," Frank said. "And this has led to bad choices."

As the Navy responds to China's increasing military profile in the South and East China seas, talk of cutting programs will undoubtedly cause concerns in Congress. Gates, during the ASEAN conference in Hanoi, stressed America's "national interest" in keeping the waters open for navigation.

The Strategic Defense Task Force recommends reducing the size of the Navy to eight carrier battle groups, Friedman said. "I think that's sufficient to accomplish what we need to, vis-a-vis China, who has zero carrier battle groups. It's a long way to go before we need to grow our navy in response to theirs --[our cuts won't] give away very much of our lead in regard to China."

The United States has built up a margin of superiority over the past 20 years, according to Carl Conetta, co-director of the Project on Defense Alternatives. "Nothing can change the fact that our navy flies two times as many aircrafts as all the navies in the world combined. We float as much power as the next 13 [most powerful] navies -- combined."

If reduced cuts allow other countries -- specifically China or India -- to challenge America's military primacy in the future, Friedman said that plans can change. "We need to preserve wealth in order to build up our military later if we have to," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.