Congress Will Rethink Combatant Command Boundaries

A U.S. sailor reviews a map aboard the Ticonderoga-class guided-missile cruiser USS Cape St. George (CG 71), July 28, 2012.

U.S. Navy photo by Mass Communication Specialist 3rd Class Christopher S. Johnson

AA Font size + Print

A U.S. sailor reviews a map aboard the Ticonderoga-class guided-missile cruiser USS Cape St. George (CG 71), July 28, 2012.

Reshaping, or even deleting, some of the four-star headquarters that run America’s military operations around the world could be part of broader Defense Department reforms.

Congress may reshape — or even close — some of the Pentagon’s combatant commands, the four-star headquarters that oversee military activities in all corners of the world, the Senate Armed Services Committee chairman said Thursday.

Sen. John McCain, R-Ariz., said his panel would look at combatant command responsibilities when it considers broader Defense Department reforms this year.

“We need to figure out whether we need the ones that we have,” McCain said at a Defense Writers Group breakfast.

The boundaries of what the military calls “COCOMs” are laid out in a document called the Unified Command Plan. Every few years, defense leaders debate redrawing the boundaries or combining commands, but there haven’t been any major changes since U.S. Africa Command was created in 2006.

Is it right for us to have an Africa [Command] headquarters in Stuttgart, Germany? Is that what we had in mind when we formed up AFRICOM?
Sen. John McCain, R-Ariz.

In 2012 and 2013, Pentagon leaders considered combining U.S. Northern Command, which oversees homeland defense of the continental United States, Canada and Mexico, with Southern Command, which oversees Central and South America. And in December, incoming Joint Chiefs Chairman Gen. Joseph Dunford said he’d be open to changes.

McCain on Tuesday hinted that lawmakers would consider combining those two commands.

“We need to look at small things, such as ‘Do we need a NORTHCOM and a SOUTHCOM?,” he said. “Why should there be an arbitrary line at the Mexico-Guatemala border?”

As well, the structure of Africa Command, which is headquartered in Europe, has been debated since its creation.

“Is it right for us to have an Africa [Command] headquarters in Stuttgart, Germany?,” McCain said. “Is that what we had in mind when we formed up AFRICOM?”

Some have argued that Northern Command should oversee all military action in the Arctic, where nations are jockeying for natural resources. NORTHCOM currently splits the responsibility with European Command.


Defense Department map, labeled, “The World With Commanders’ Areas of Responsibility.”

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.