Obama unveils defense strategy for a changing, austere world

None Pablo Martinez Monsivais/AP

The Pentagon's new strategy for countering emerging threats in an era of shrinking resources reflects the Obama administration's belief that ground wars like Afghanistan are a thing of the past while air and naval conflicts against nations like Iran or China will be the biggest security challenges facing the U.S. in the years ahead.

The document unveiled by President Obama during an unusual Pentagon visit is a blueprint of sorts for the military in the years ahead. It is a clear reflection of the new budgetary realities facing the military as its budget starts falling after a decade of steady growth. Military funding will fall by more than $450 billion in the years ahead; if automatic sequestration cuts take effect, it will lose another $500 billion.

Below are some of the strategy's key points:

  • Moving away from a belief in the necessity of fighting two ground wars at the same time in favor of fighting one while "denying and deterring aggression" elsewhere, including using limited amounts of ground forces. This has been heralded as a major shift, but isn't. Donald Rumsfeld was arguing that the so-called "two war doctrine" was outdated more than a decade ago, and his successor, Robert Gates, regularly argued that there was no foreseeable possibility of large-scale ground conflicts in the near future.
  • Shrinking the Army and Marine Corps by tens of thousands of troops because the manpower-heavy wars in Iraq and Afghanistan are over or winding down, paired with a belief that future conflicts won't be long ground wars. In an opening letter, Defense Secretary Leon Panetta said the new force will be "smaller and leaner." The document also acknowledges that the era of counterinsurgency-which has fallen out of favor because of the length and cost of the Afghan war-is basically over. "U.S. forces," the document states, "will no longer be sized to conduct large-scale, prolonged stability operations."
  • Shifting more military and financial resources away from Europe and toward the Asia-Pacific region while expanding a security partnership with India.
  • Continuing to work with the Treasury and State departments to prevent Iran from obtaining a nuclear weapon. This will involve operations to "locate, monitor, track, interdict, and secure" weapons of mass destruction and their essential components. The document also suggests that the size of the American nuclear arsenal may shrink.
  • Requiring closer cooperation between the Air Force and Navy to leverage their individual strengths as a way of effectively countering Iran or China despite the overall cuts to the Pentagon budget.
  • Devoting new resources to intelligence and Special Operations units involved in counterterror missions around the globe.
  • Expand the military's abilities to wage cyber-war and operate in space.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.