Pentagon Moves More Communications Gear into Cheyenne Mountain

The entrance of the Cheyenne Mountain complex.

NORTHCOM

AA Font size + Print

The entrance of the Cheyenne Mountain complex.

Largely abandoned a decade ago, the iconic Cold War bunker is getting an upgrade.

The Pentagon is beefing up its communications setup inside a hollowed-out section of Colorado’s Rocky Mountains less than a decade after it had largely abandoned the site.

The gear is being moved into Cheyenne Mountain to protect it from electromagnetic pulses, said Adm. William Gortney, commander of U.S. Northern Command and NORAD.

“[T]here is a lot of movement to put capability into Cheyenne Mountain and to be able to communicate in there,” Gortney said Tuesday during a news briefing at the Pentagon.

Electromagnetic pulses, or EMPs, can occur naturally or by manmade devices such as nuclear weapons. For years, the Pentagon has been working on building weapons that could fry the electronic equipment of an enemy during battle.

“Because of the very nature of the way that Cheyenne Mountain is built, it’s EMP-hardened,” Gortney said. “It wasn’t really designed to be that way, but the way it was constructed makes it that way.”

Being able to communicate during an EMP attack is important, Gortney said.

“My primary concern was: ‘Are we going to have the space inside the mountain for everybody that wants to move in there?’ … but we do have that capability,” he said.

Last week, the Pentagon awarded defense firm Raytheon a $700-million contract to install new equipment inside the mountain. The company said the contract, which runs through 2020, will “support threat warnings and assessments for the North American Aerospace Defense Command Cheyenne Mountain Complex.”


Sign up here to watch Air Force Chief of Staff Gen. Mark Welsh sit down with Defense One’s Marcus Weisgerber for an exclusive interview on April 22. 


The Pentagon’s March 30 contract announcement said Raytheon will provide sustainment services and products supporting the Integrated Tactical Warning/Attack Assessment (ITW/AA) and Space Support Contract covered systems. “The program provides ITW/AA authorities accurate, timely and unambiguous warning and attack assessment of air, missile and space threats,” it said.

Since 2013, the Pentagon has awarded contracts worth more than $850 million for work related to Cheyenne Mountain.

The Colorado complex is the embodiment of the Cold War, an era when bunkers were built far and wide to protect people and infrastructure. Cheyenne Mountain was the mother of these fallout shelters, a command center buried deep to withstand a Soviet nuclear bombardment. The complex was locked down during the Sept. 11, 2001, attacks on New York and Washington.

Air Force Space Command runs the mountain and maintains sleeping quarters, fresh water and a power station that would be used during an attack.

Almost a decade ago, NORAD pulled most of its staff out of Cheyenne Mountain and moved its command center into the basement of a headquarters building at nearby Peterson Air Force Base. Since then, Cheyenne Mountain has served as a back-up site.

Now the Cheyenne Mountain staff is set to grow again. Still, the command center at Peterson will remain operational, Gortney said.

In June 2013, then-U.S. Defense Secretary Chuck Hagel gave a speech in front of the mammoth blastproof doors on the roadway leading into the mountain.

“These facilities and the entire complex of NORAD and NORTHCOM represent the nerve center of defense for North America,” he said at the time.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.