Back to news

May 14, 2019 | International, Aerospace

US Air Force nuclear, space programs take hit in border wall reprogramming

By: , , and

Correction: A previous version of this story contained an erroneous amount of reprogrammed money. The story has been updated to show the Pentagon reprogrammed $1.5 billion in FY19 funds.

WASHINGTON — In the wake of the Pentagon reprogramming $1.5 billion in fiscal 2019 funds to support President Donald Trump's border wall with Mexico, only the U.S. Air Force appears to be losing money appropriated for equipment updates.

The funding largely comes from personnel accounts in the Air Force, Navy and Army. But the Air Force is the only service to lose funding for hardware, including nuclear and conventional weapons, surveillance aircraft updates, and space programs.

Overall, the Pentagon reprogrammed $818.465 million from FY19 defense appropriations, as well as $681.535 million from FY19 overseas contingency operations accounts, or OCO, to reach that $1.5 billion total.

Lawmakers expressed concern that the use of military resources and manpower on the southern border will damage military readiness. However, acting Defense Secretary Patrick Shanahan said last week that ongoing deployments to support the Defense Department aren't doing so.

“We've seen no degradation to readiness,” he told Senate appropriators May 8 at a defense budget hearing. “In fact, in some cases, it's enhanced our readiness because the troops get to perform certain functions.”

Congressional Democrats and some Republicans have objected to the administration's use of this mechanism for funding the president's border wall, arguing it bypasses Congress' constitutional power of the purse. For the second time in recent weeks, the Pentagon ignored decades of precedent and carried out the transfer of funds without first consulting with the Senate Appropriations Committee.

Sen. Patrick Leahy, the Senate Appropriations Committee's top Democrat, led a letter to Shanahan on May 10 to object to the latest instance, saying it harms hurricane cleanup at Tyndall Air Force Base, Florida.

“We are dismayed that the Department has chosen to prioritize a political campaign promise over the disaster relief needs of our service members, given the finite reprogramming authority available," the lawmakers wrote.

They noted that Shanahan's decision to notify Congress of the reprogramming came a day after he testified before the subpanel that oversees defense spending, and they wrote that they welcomed his views on “how you intend to repair the damaged relationship between the defense oversight committees and the [Defense] Department.”

The letter was also signed by the Senate Armed Services Committee's top Democrat, Sen. Jack Reed, as well as Democratic Sens. Dick Durbin, Brian Schatz, Tom Udall , Patty Murray, Chris Murphy, Tammy Baldwin, Dianne Feinstein and Jon Tester.

The reprogramming could be a topic at Shanahan's future confirmation hearing for the full job of defense secretary. A date for that hearing has not been set.

Why the Air Force?

About half of the non-OCO $818 million sum the Defense Department wants to redirect to the border comes from Air Force accounts, with space and missile programs taking the biggest hit. In total, the Pentagon expects the service to shear $402 million off its FY19 budget.

About $210 million would be cut from Air Force space programs, specifically the Evolved Expandable Launch Vehicle program, which funds the use of rockets that send satellites and other capabilities into space. According to the reprogramming document, one rocket launch has been canceled due to the “Space Test Program (STP)-4 satellite provider termination of the Robotic Servicing of Geosynchronous Satellites (RSGS) spacecraft,” which is no longer necessary under the National Security Strategy.

The Air Force's program for modernizing its E-3 Sentry early warning aircraft — more commonly called AWACS — also could lose funding that it no longer needs in FY19.

The program, "Diminishing Manufacturing Sources Replacement of Avionics for Global Operations and Navigation,” or DRAGON, updates the E-3's avionics and brings it into compliance with future air traffic control requirements. But it is moving too slowly to use all of the funds it was appropriated in FY19, so the administration aims to have $57 million diverted for border protection.

DRAGON has been delayed for two reasons, according to the reprogramming request. First, “aircraft have been available for programmed depot maintenance” at a slower-than-planned rate, dragging out the modification schedule. Additionally, DRAGON integration can only occur after AWACS are upgraded to the Block 40/45 configuration, and not all aircraft have gone through that process.

The Air Force sees AWACS as a key part of its initial version of the Advanced Battle Management System, a family of systems that will provide ground surveillance across the different military services. Instead of retiring seven E-3s in FY18, Gen. Mike Holmes, head of Air Combat Command, said those planes could be upgraded with new sensors and communications gear.

However, DRAGON isn't the only modernization effort for the Sentry that is moving slower than expected. In November, Bloomberg reported that the service terminated a contract with Boeing to upgrade the AWAC's characteristic disc-shaped radar due to repeated delays.

Other Air Force programs that will take a hit include a planned upgrade to the Minuteman III intercontinental ballistic missile and the air-launched cruise missile programs.

A number of top defense officials previously said nuclear modernization is the top priority for the Pentagon, including Ellen Lord, the department's acquisition head, who on May 1 told Congress: “We have weapons that are decades over what was supposed to be their useful life. And we are out of time. We need to continue on the path we're on, or we are going to fall behind and not have the nuclear deterrence that we enjoy today.”

The document reprograms $24.3 million, of the $124.5 million appropriated in FY19, from the Minuteman III Launch Control Block Upgrade program; the document claims funds are available due to a “slip in the production schedule for FY 2020.”

Meanwhile, $29.6 million — more than half of the $47.6 million appropriated for the air-launched cruise missile programs in FY19 — will be reprogrammed. The explanation for that change: “Funds are available due to contract savings from reduced guided missile flight controller modification requirements; and due to lack of executable requirements for Support Equipment and Low Cost Mods in FY 2019.”

The reprogramming of funds for the Hellfire missile is also notable, as the Pentagon has identified a lack of munitions stockpiles as a major issue to address in its budget request. As an example, the FY20 budget called for the maximum rate of production possible on Hellfire: $730.8 million for 9,000 of the weapons.

The document states that funds are “available due to contract savings from all variants that provide precision kill capabilities. Savings are attributed to negotiated lower unit costs per missile system.”

https://www.defensenews.com/smr/federal-budget/2019/05/13/us-air-force-nuclear-space-programs-take-hit-in-border-wall-reprogramming/

On the same subject

  • After huge hack, Biden security picks want more cyber coordination with industry

    January 21, 2021 | International, C4ISR, Security

    After huge hack, Biden security picks want more cyber coordination with industry

    Andrew Eversden WASHINGTON — Two top national security nominees advocated Tuesday for stronger federal cybersecurity and increased collaboration with contractors in the aftermath of a supply chain breach that infiltrated numerous federal agencies. If confirmed, retired Army Gen. Lloyd Austin and Avril Haines, President-elect Joe Biden's nominees for defense secretary and director of national intelligence, respectively, would start their jobs in the middle of the national security community's assessment of damage from a cybersecurity breach pinned on Russian hackers. They gained access through software from SolarWinds, a major government contractor. “We must elevate cybersecurity as an imperative across the government in order to defend the American people and U.S. critical infrastructure,” Austin told the Senate Armed Services Committee in his answers to the lawmaker's advance policy questions. “Additionally, the government must continue to strengthen its partnership with the private sector to foster greater information sharing and collaboration.” So far, federal investigators have discovered breaches at “fewer than 10” federal agencies, though the Pentagon and intelligence community haven't confirmed whether their offices were among the victims. Haines, who served as deputy CIA director and deputy national security adviser to President Barack Obama, found it concerning that the breach first came to light through cybersecurity company FireEye, instead of through U.S. government cybersecurity operators. “[I] absolutely share ... concern that we're actually able to detect these because that's obviously absolutely critical to us protecting against them,” Haines said before the Senate Select Committee on Intelligence. “I think ... it was pretty alarming that we found out about it through a private company as opposed to our being able to detect it ourselves to begin with.” In response to the breach, Austin committed to reviewing the DoD's cyber posture and emphasized that Russia must be punished for infiltrating federal networks. In the advance questions, Austin stopped short of calling the breach an act of war, arguing that designation “requires a case-by-case and fact-specific determination.” “For example, malicious cyber activities could result in injury, death or significant property destruction,” Austin wrote. “These activities would need to be considered in their totality.” An early January announcement from several federal investigators, including the NSA and Office of the Director of National Intelligence, stated that the breach was believed to be an espionage campaign and “likely Russian in origin.” “If that's the case, I think Russia should be held accountable,” Austin said at the hearing. “That's my personal belief.” Sen. Jack Reed, D-R.I., who sits on both SASC and SSCI, called the breach “the greatest cyber intrusion in the history, I think, perhaps, of the world” and said that the stovepiped nature of the U.S. national security apparatus needed to be addressed. Reed said one challenge for Haines will be developing a “more coherent, cohesive, integrated approach” to dealing with cybersecurity threats, particularly from advanced nation-state actors. Under questioning from senators, Haines said the SolarWinds supply chain hack was a “grave threat,” and the government needs new to improve its defenses against such attacks, though she noted that she hasn't received a classified briefing on the intrusion. In 2019, a report from ODNI warned of growing software supply chain hacks that provide an “efficient way to bypass traditional defenses and compromise a large number of computers.” “To prevent a recurrence of this kind of attack, we need to close the gap between where our capabilities are now and where they need to be in order to deter, detect, disrupt and respond to such intrusions far more effectively in the future,” Haines wrote in her questionnaire. “If confirmed as DNI, I will review the expert conclusions from the SolarWinds incident and the current intelligence about supply chain vulnerabilities and what steps may be taken to address any vulnerabilities.” Haines told senators that she would assess how the intelligence community can improve its cybersecurity partnerships with industry and the whole federal government. “I believe that the IC plays an integral role in detecting and warning against nation-state targeting of U.S. networks and infrastructure,” she wrote. “If confirmed, I will examine how better collaboration between the IC and the rest of the U.S. government, coupled with closer partnerships with the private sector and our international allies, can enhance our ability to deter, detect, and mitigate cyberattacks.” Haines will review whether the intelligence community is allocating resources properly to face advanced cyber threats and will examine the adequacy of the IC's existing authorities to protect the digital infrastructure of the United States, she said. Austin pointed to a cyber-threat sharing partnership the department has with the defense industrial base and stated that the department should “continue to look for ways to better integrate with interagency partners and the private sector.” In light of the SolarWinds breach, the senators on SSCI wrote that they are worried about a “lack of mandatory threat information sharing between the private sector and government,” adding that any information sharing from the private sector after the breach is voluntary. Haines would review the relationship. “Information sharing between the IC and the private sector is increasingly important to ensure that our data systems and networks are secure,” she wrote. “If confirmed as DNI, I look forward to reviewing the Intelligence Community's data sharing and information exchange relationship with the private sector, to engaging with IC experts and private sector leaders on what information is currently being shared, and to examining the efficacy of the current framework for sharing threat information.” The incoming Biden administration has signaled that it will prioritize cybersecurity in the aftermath of the SolarWinds breach. The Biden team named Anne Neuberger, the NSA's cybersecurity director who worked to improve information sharing with the private sector, to National Security Council as deputy national security adviser for cyber and emerging technology. Haines wrote that she will “ensure” that the intelligence community has a “robust data sharing and information exchange relationship” with private companies and said that she will be “studying current information sharing to determine how it can be improved and what types of information can be shared to enhance cybersecurity protections.” “The private sector has unique insight and expertise on malicious activity occurring within its networks,” Haines said. “Real-time integration of private sector and government data could lead to more effective prevention and mitigation outcomes.” Cyber norms and deterrence For the last few years, the U.S. government wrestled with the concept of deterrence in the cyber domain, a complex challenge that including resilient defenses, risk management and strong international partnerships. As the SolarWinds breach demonstrated, deterring adversaries from hacking, which is seen as below the threshold of an armed response, is difficult. In response to a question from Sen. John Cornyn, R-Texas, about how to approach cyber deterrence, Haines pointed to many of the same tenets of current U.S. cyber deterrence, including imposition of costs for malicious actors' behavior, bringing foreign allies together to impose those costs, building resilient systems that are hard to hack, developing norms and creating strong relationship with the private sector. Haines wrote that setting norms should include outlining sanctionable behavior with the agreement from allies. A cornerstone to sanctioning is attributing cyberattacks to actors, a challenging undertaking in the cyber realm. Sen. Mark Warner, D-Va., said he wanted Haines to be more forthcoming with attribution of cyberattacks, stating that he found it “extraordinarily concerning” that the “[Trump] White House underplay[ed] attribution on Russia.” Attribution, Haines said, would be a major piece of the ODNI's role in deterrence. “Something we [ODNI] can do is promote the ability to detect when adversaries are engaging in such activity so as then to provide information about attribution, for example. And then hold adversaries to account through that.” https://www.c4isrnet.com/cyber/2021/01/20/after-huge-hack-biden-security-picks-want-more-cyber-coordination-with-industry

  • ANALYSIS | The political tides of war are shifting — and may be taking Ukraine with them | CBC News

    February 10, 2024 | International, Land

    ANALYSIS | The political tides of war are shifting — and may be taking Ukraine with them | CBC News

    We have been warned — over and over again lately — that Russia’s invasion of Ukraine is an inflection point in history. And while the soaring political rhetoric may have sounded good over the last few years, it's very likely that this week, we truly arrived at that turning point.

  • NIWC Atlantic is Named First DoD Entity to Join Amazon Web Services Academy

    July 24, 2019 | International, Naval

    NIWC Atlantic is Named First DoD Entity to Join Amazon Web Services Academy

    By Diane Owens, Naval Information Warfare Center (NIWC) Atlantic Public Affairs CHARLESTON, S.C. (NNS) -- Certified cybersecurity instructors at Naval Information Warfare Center (NIWC) Atlantic's Cyber Education and Certification Readiness Facility (CERF) in Charleston are collaborating with Amazon Web Services (AWS) to train active duty military members and civilian employees in cloud computing. The training is part of the first Department of Defense (DoD) AWS academy and is offered to all branches of service. AWS Academy is a pathway for students and educators to gain AWS cloud computing skills and knowledge via AWS-authorized curriculum; the courses prepare students to pursue industry-recognized AWS certifications. “This is a tremendous honor and an incredible opportunity to lead the way in cloud computing education for DoD employees,” said Andrew Mansfield, NIWC Atlantic technical director. “Cloud computing is a key component of the next generation of IT and is critical to maintaining the military's technological advantage. It represents significant change – end-to-end.” CERF instructors met stringent requirements for certification as part of NIWC Atlantic's commitment to develop and retain a credentialed workforce. “The CERF team is providing active duty military members and civilian employees foundational opportunities to learn about and stay abreast of emerging technology domains such as cloud,” said Mansfield. Wesley Jones, NIWC Atlantic CERF instructor, taught the first one-week, face-to-face portion of the AWS Academy Cloud Foundations course to Marine Corps active duty members and civilian employees at the Pentagon June 10 – 14. The instructors used AWS-provided coursework including lectures, self-assessments and hands-on lab projects. In addition to classroom training, AWS Academy provides students with one-year online access to remote curriculum that supplements classroom training. Jones also distributed a step-by-step checklist he developed for self-study to help students pass the related AWS certification exam. He plans to track and encourage class members as they obtain certification. “The students loved the class; everyone was amped up,” Jones said. “Because I'm a government employee, it put them at ease. We were able to discuss and apply classroom concepts used in government projects during class.” The CERF has also partnered with AWS Educate, which makes a free online IT sandbox – Amazon Console – available to students for classroom labs and scenarios they create on their own. The students' sandbox and fresh expertise deploy and test networks, systems and applications relevant to their customers' requirements. “Bringing the instructor to the classroom to avoid having students travel to vendor training is convenient – and it's a huge cost avoidance,” said Jeff Hays, NIWC Atlantic Marine Corp team lead. “Classroom networking is also extremely beneficial; it allows students to discuss specific challenges from the perspective of a DoD environment and facilitates sharing experiences. You don't get that at vendor training.” NIWC Atlantic instructors Jones, Kamau Buffalo and Fred Bisel are working diligently to pass additional certification exams so they can teach more AWS courses as they are released. “The instructors are stars,” said Bisel. “They teach part-time and have other jobs as members of various integrated products teams – many involving cloud computing. Most of their certification study and classroom preparation occurs after business hours -- and they're also staying abreast of innovations that affect material in existing classes. It's a continuous learning process and they're highly motivated.” The second AWS Academy course for Marine Corps members took place at the Marine Corps Information Technology Center in Kansas City, Missouri, in July. To inquire about DoD cloud computing training, contact Bisel at earl.bisel@navy.mil. As a part of Naval Information Warfare Systems Command, NIWC Atlantic provides systems engineering and acquisition to deliver information warfare capabilities to the naval, joint and national warfighter through the acquisition, development, integration, production, test, deployment, and sustainment of interoperable command, control, communications, computer, intelligence, surveillance, and reconnaissance, cyber and information technology capabilities. Get more information about the Navy from US Navy Facebook or Twitter. For more news from Space and Naval Warfare Systems Command, visit www.navy.mil/local/spawar/. https://www.navy.mil/submit/display.asp?story_id=110327

All news