Pentagon: No more big defense mergers

The Defense Department will try to stop consolidation among the nation's biggest weapons contractors, who are bracing for potentially far-reaching cuts in defense spending because of the nation's yawning budget deficit, a top Pentagon official said in an interview.

Ashton Carter, the Pentagon's top acquisitions official, said he expected the defense industry to go through a period of profound change as it adjusts to a new era of austerity. But he cautioned that the department would take steps to prevent mergers and acquisitions within the ranks of major defense contractors like Raytheon and Boeing, whose numbers have fallen sharply since the end of the Cold War.

"We would not allow any further mergers of the big ones," Carter, the Pentagon's undersecretary of Defense for acquisition, technology, and logistics, told National Journal. "On occasion we will intervene by blocking a transaction if we thought it was excessively short-term focused and had done a poor long-term risk analysis."

In 1993, during a very different era for defense contracting, Carter was one of the participants at what came to be known as the "Last Supper."

Then-Defense Secretary Les Aspin summoned the chief executive officers of the nation's 15 biggest defense contractors to the Pentagon and bluntly told them they needed to start consolidating.

Carter, who served as an assistant secretary of Defense during the Clinton administration, noted that the industry had roughly 40 major players during its Cold War peak. Within a few years of the Last Supper, the industry had shrunk to barely a half-dozen large companies players.

In the interview, Carter said the number of major defense firms shouldn't be allowed to fall any further, particularly since the coming cuts won't be as pronounced as had been the case after the end of the Cold War.

"It won't be like in the 1990s," he said. "I don't expect [the industry] to contract any further."

Still, Carter said it could no longer be business as usual at the Pentagon. The Defense Department's base budget has nearly doubled since 2001, but the Obama administration and Congress have made clear in recent months that the Pentagon budget will be held steady-and possibly even cut-in the years ahead. On Monday, for instance, the House Armed Services Committee recommended cutting $9 billion from the department's fiscal 2012 request.

In the interview, Carter said the department will work to reduce the $200 billion it spends each year on logistics and maintenance by about 5 percent, savings he described as "real money." He estimated that such efficiencies could save the department as much as $100 billion in coming years.

One weapon the Pentagon will use in its fight to rein in runaway spending is what Carter refers to as a "share line," an agreement allowing contractors who bring their projects in below budget to keep some of the savings. If an aerospace firm manufacturer delivered a next-generation drone for $200 million less than had been projected, for instance, it might be allowed to keep $100 million for itself. The government would keep the rest.

"Businesses all over the country are constantly, ruthlessly routing out unnecessary costs and making themselves leaner," Carter said. "We have to provide incentives for [defense contractors] to do that. "

In the end, though, Carter said major defense firms will have to find ways of delivering their products for less money for the simple reason that there is less money to go around.

"The alternative to adaptation is just canceling programs," he said in the interview. "The programs that survive will survive in part because they are being economically managed. And if you're a poorly-run program and you're not performing, that ipso facto puts you on the potential cut list."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.