BRAC panel calls closure round premature

The Base Closure and Realignment Commission concluded in its report to President Bush that the current effort to shrink the nation's military infrastructure should not have started until after the Pentagon had completed its sweeping review of defense strategy, plans and forces early next year, according to a draft reviewed by CongressDaily.

The independent panel also wrote that the base-closure process has "repeatedly proven its worth" since it began in 1988, but recommended holding off on another round of closures until 2015, giving lawmakers and communities a decade before launching into the long and sometimes painful ordeal.

The commission's criticism of the timing of the base-closure round echoed concerns voiced repeatedly by opponents of the current base closure round during a frenzied summer spent assessing the need for military and civilian defense facilities.

By completing base-closures before the Pentagon concludes its Quadrennial Defense Review, which is due to Congress in February, the commission concurred with BRAC opponents, saying it was forced to make assumptions about the military's needs for the future. By law, the QDR requires the Defense Department to undertake a sweeping review of military strategy, missions and capabilities.

"The commission finds illogical the seemingly inverse order that the department followed in arriving at its list of facilities for closure and realignment," the report said.

The nine-member panel chose the 2015 date for the next round to coincide with the conclusion of the 2013 quadrennial review. After 2015, commissioners recommend conducting a base-closure round in eight-year intervals that would follow the completion of the four-year review. The current round was authorized by Congress in legislation signed into law in December 2001.

The commission sent its final report to the White House late Thursday after New Jersey lost an emergency appeal to the Supreme Court involving the Fort Monmouth Army base. New Jersey lawmakers had sought an injunction that would have prevented delivery of the list to the White House.

The president must decide by Sept. 23 whether to accept all of the commission's base closure recommendations or send it back to the commission for revisions. If he accepts the recommendations, Congress would have 45 days to vote its disapproval, or the commission's list of changes becomes law.

The bound, 337-page draft report reviewed by CongressDaily appeared to be a final version but without portions addressing issues now in litigation. Several pages contain criticism of the Pentagon's approach to this base-closure round, including the commission's complaint that there was a "lack of sufficient interagency cooperation" between the Defense, Veterans Affairs and Homeland Security Departments.

In particular, the commission criticized Homeland Security officials, who turned down at least one request to testify before the panel. "Neither the commission nor [the Defense Department] was well served by the lack of Department of Homeland Security input," the report said.

The commission also chided the Air Force for failing to consult with governors and state adjutants general on major changes proposed for the Air National Guard. For future rounds, the commission recommended gathering "early and constructive" input from states on decisions affecting the National Guard.

Further, the report said the Pentagon failed to complete a 20-year threat assessment that was required under base-closure law. A formal request for the assessment in July from the commission to the department "confirmed" that officials had not conducted the mandatory review, the report said.

Commissioners also highlighted the Pentagon's delay in sending information pertaining to base-closure recommendations to both the commission and Congress, an early sticking point for lawmakers intent on stalling the base-closure round. The Pentagon responded that it had to scrub the documents for classified data.

The entire process "could have been expedited had the department anticipated the potential security risks presented by the ... data and planned ahead to prevent problems with its release," according to the report.

In future rounds, commissioners urged the Pentagon to consider input from combatant commanders early on in their two-year review of military installations. In the current round, combatant commanders were not consulted until October 2004, just eight months before Defense Secretary Rumsfeld completed his recommendations and sent them to the commission and Congress, the report said.

Commissioners also recommended giving more weight to input from so-called joint and cross-service groups to help further the department's move to a more unified fighting force.

As part of a long appendix to the report, the commissioners offered new base-closure legislation that would make substantial changes to the base-closing process, including giving a future commission an additional three months to complete its work.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.