Back to news

May 6, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

Esper: Flat budget could speed cutting of legacy programs

By: Aaron Mehta

WASHINGTON — If the Pentagon faces tighter budgets in the coming years, departmental planners should look to cut legacy programs first in order to preserve funding for modernization requirements, Defense Secretary Mark Esper told reporters Tuesday.

“Frankly, my inclination is not to risk any in the modernization programs; it's to go back and pull out more of the legacy programs,” Esper said in response to a question about what modernization priorities, such as shipbuilding, might be on the table.

“We need to move away from legacy [programs] and we need to invest those dollars into the future. We have a lot of legacy programs out there right now. I could pick dozens out from all branches of the services. So that is where I would start,” he continued.

“What that would mean is probably accepting some near-term risk, but I think that is something [that has to happen], given the trajectory that we see China is on, and we know where Russia may be going in the coming years. So that is one place where I would begin, but we're going to be working through this course of action.”

The secretary also emphasized that he's not going to “risk the strategic deterrent,” reiterating that modernizing America's nuclear capabilities remains the department's top priority.

Budgets were already expected to be flat or decline slightly in the coming years before the coronavirus pandemic, which has required the U.S. government to pump trillions of dollars into the economy. Esper said that “tremendous load” is something the department must consider as it plots a budget strategy for fiscal 2022 and beyond.

His comments match what the secretary said Monday during an appearance at the Brookings Institution, where he said the spending spree in response to the spread of COVID-19 means the department's ongoing efforts to find internal efficiencies must continue to bear fruit.

The department claimed savings of $6.5 billion in FY19 through process reforms and the sale of obsolete equipment, with another $5.7 billion in spending reallocated from legacy programs to modernization priorities.

During the Brookings event, Esper noted that the department will “likely need” extra money from Congress if a fourth coronavirus supplemental fund is worked out, in order to help cover costs for medical supplies procured by the Pentagon.

At the start of his press event, the secretary used prepared remarks to note that top defense leaders will be appearing at the Senate Armed Services Committee tomorrow to discuss the Federal Communications Commission's decision to allow Ligado to operate in the L-band spectrum, a move long opposed by the department because of concerns it will negatively impact GPS.

Esper said the decision “disregards the many objections of industry and the inner agency, grounded in years of hard data and science. Ultimately this will cause harmful interference to the GPS network, jeopardizing our nation's security, prosperity and way of life.”

The secretary declined to comment on why the FCC moved ahead with the decision. C4ISRNET, a sister publication of Defense News, has reported the decision came amid political pressure from top Trump administration officials.

https://www.defensenews.com/pentagon/2020/05/05/esper-flat-budget-could-speed-cutting-legacy-programs/

On the same subject

  • CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

    August 25, 2024 | International, C4ISR, Security

    CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

    CISA warns of active exploitation of Versa Director vulnerability CVE-2024-39717. Agencies urged to patch by September 2024.

  • Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

    May 7, 2024 | International, C4ISR

    Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

    Red Teaming or Exposure Management? Find out how combining these powerful approaches can fortify your cybersecurity defenses.

  • The key to securing the defense industrial base is collaboration

    July 16, 2020 | International, C4ISR, Security

    The key to securing the defense industrial base is collaboration

    Teresa Shea With cyber threats constantly evolving and increasing in sophistication, a strong national cybersecurity posture has never been more important. COVID-19 is causing an uncertainty across industry sectors, and criminals as well as adversaries are increasing their cyber-attacks and taking advantage of our increased digital work from home dependence. It is especially important to protect the organizations that comprise the U.S. Defense Industrial Base. Defined as the “worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements,” Defense industrial base networks host mission-critical information and operational assets vital to national security. If infiltrated, the ramifications could plague the U.S. national security strategy, hamper our warfighting edge, create chaos within the critical infrastructure and ultimately undermine adversary deterrence. To effectively protect the Defense Industrial Base, the government and private sector must both work to secure the U.S. critical infrastructure. Organizations should prioritize collaboration to bolster the nation's cyber resiliency and collectively defend against malicious cyber actors' intent on doing us harm. Proactively defend networks It's widely known that, in an ideal world, organizations should stop threats before they reach their targets. However, to deter effectively, organizations need to have real-time situational awareness of their network infrastructure and supply chain, which can be a difficult undertaking. Threat intelligence information sharing between the government and the private sector companies that comprise the Defense Industrial Base is essential to achieving a strategic view of an advanced threat actor. Today, targets can only know what is happening to their own assets without insight into the attacker's intent. The Defense Industrial Base Cybersecurity Program allows both the DoD and private companies to share cyber threat information, mitigation and remediation strategies, which helps key players in both sectors increase cyber situational awareness and be more proactive in their security efforts. However, this program is currently voluntary, meaning that the crucial information uncovered within the program is only available to those who proactively join the program. Moving forward, both the public and private sectors must work to enact policies that require collaboration. It is no longer acceptable to rely on incident response protocols, performance assessments of existing systems and one-off reactions to threats without coordination. Increased information sharing is key to staying one step ahead of our adversaries. Follow government-suggested guidelines The U.S. government has dedicated time and resources to help secure the Defense Industrial Base, and organizations must act upon the recommendations provided. Earlier this year, the Cyberspace Solarium Commission released a report on the U.S. government's cyber readiness, which found that “the U.S. is currently not designed to act with the speed and agility necessary to defend the country in cyberspace.” The commission's findings place an emphasis on protecting the Defense Industrial Base's intellectual property, and called on Congress to require that these firms share threat data with the DoD and conduct threat hunting on their networks. Both sharing threat data and conducting threat hunting are proven to result in increased defense of our networks. A secure future As noted in a recent LawFare blog, “Cyber-enabled intellectual property theft from the DIB and adversary penetration of DIB networks and systems pose an existential threat to U.S. national security.” Given the abundance of cyber-attacks focused on Defense Industrial Base networks, penetrating them is high on our adversaries' target list. They're currently zeroing in on the U.S. critical infrastructure, attempting to poach the intellectual property that secures our very nation. Until we are willing to come together across sectors to share threat data, and commit to hiring strong talent, we will remain at a disadvantage. Fundamentally, it is about trust and our ability to put the greater defense above individual interests. If accomplished, the U.S. cybersecurity posture and resiliency will remain strong, deterring malicious cyberattacks against our Defense Industrial Base. https://www.c4isrnet.com/opinion/2020/07/15/the-key-to-securing-the-defense-industrial-base-is-collaboration/

All news