Dunford: New Pentagon Staff Needed to Meet Transregional Threats

Marine Corps Gen. Joseph F. Dunford Jr., the 19th chairman of the Joint Chiefs of Staff, delivers remarks at the Boston Semper Fidelis Society Birthday Luncheon at the Boston Convention and Exhibition Center in Boston,Nov. 13th, 2015.

Department of Defense photo by Petty Officer 2nd Class Dominique A. Pineiro

AA Font size + Print

Marine Corps Gen. Joseph F. Dunford Jr., the 19th chairman of the Joint Chiefs of Staff, delivers remarks at the Boston Semper Fidelis Society Birthday Luncheon at the Boston Convention and Exhibition Center in Boston,Nov. 13th, 2015.

Today’s system of regional combatant commanders is ill-suited for broader challenges, Joint Chiefs chair says.

To meet the transregional threats of today and tomorrow, the Pentagon needs a staff that can look at regional threats and make recommendations to the Defense Secretary, Marine Gen. Joseph Dunford said Monday.

Currently, the lowest level of integration across regions is the secretary of defense, Dunford said at a national security forum co-hosted by the Center for a New American Security and Defense One. The perspectives and operational plans developed by the current system of regional combatant commanders are insufficient to face challenges such as militant extremism, he said.

“It’s my assumption today that it would be very difficult for any conflict to be isolated to a region,” Dunford said. “When you think about potential adversaries in the future, I think we need to think about strategy right up front that takes into account it is in all likelihood going to be fought in that way.”

For example, weapons like ballistic missiles could launch in one region of the world and hit a target on the other side of the globe. Under the U.S. military’s current structure, that missile could traverse the jurisdictions of multiple generals or admirals.

“I do believe that there needs to be a staff that has a perspective of all the combatant commanders,” Dunford said. That staff would provide “a common operational picture” and “frame decisions for the secretary of defense” for scenarios “that do involve multiple regions simultaneously.”

The Joint Staff, as structured, is not configured to operate that way, he said. 

Dunford also said he’d be open to changing the Unified Command Plan, which defines the boundaries of each combatant command. 

The chairman’s words are sure to feed the nascent debate over changes and updates to the Goldwater-Nichols Act, the three-decade-old legislation that created the combatant command system and forged modern jointness. His recommendation comes as the Pentagon conducts a review of the 1986 act and as Sen. John McCain, R-Ariz., has been holding a series of hearings that are looking at ways to modify the law.

Dunford is also looking to tweak — at least — the way his Joint Staff does business. It will shrink in the new year, he said. He didn’t specify how, but said he could “walk away” from some issues.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.