Obama Boosts Asia Pivot, Expands U.S. Troop Access to Philippines

President Barack Obama and Philippine President Benigno Aquino III shake hands at the conclusion of a joint news conference at Malacanang Palace in Manila, Philippines, Monday, April 28, 2014.

Charles Dharapak/AP

AA Font size + Print

President Barack Obama and Philippine President Benigno Aquino III shake hands at the conclusion of a joint news conference at Malacanang Palace in Manila, Philippines, Monday, April 28, 2014.

President Barack Obama announced a 10-year agreement to send additional American troops and equipment through the Philippines. By Ben Watson

President Barack Obama delivered new tangible proof of his much-touted pivot to Asia on Monday by finalizing an agreement with Manila that allows for additional U.S. troops and equipment to rotate through the Philippines’ military bases.

The deal permits greater numbers of Americans to train and modernize the Filipino military over the next 10 years, but does not authorize any new American bases on the Pacific island nation. It is the administration’s latest in a series of bilateral agreements in Southeast Asia toward fulfilling the Defense Department’s strategy of seeking to expand U.S. military access to Asian ports, bases and airbases stretching from the Indian to Pacific oceans, rather than building new American outposts.

“I want to be very clear,” Obama said, on the last stop of his four-nation Asia tour, “The United States is not trying to reclaim old bases or build new bases. At the invitation of the Philippines, American service members will rotate through Filipino facilities. We’ll train and exercise more together so that we’re prepared for a range of challenges, including humanitarian crises and natural disasters like [2013’s Typhoon] Yolanda.”

President Benigno Aquino and Obama gave the obligatory caution that the agreement is not intended as a threat to Beijing, which has a standing territorial dispute with Manila over a portion of the South China Sea known in Manila as the West Philippine Sea.

“I think this is going to be a terrific opportunity for us to work with the Philippines to make sure that our navies, our air force are coordinated, to make sure that there’s information-sharing to allow us to respond to new threats, and to work with other countries, ASEAN countries Australia, Japan,” Obama said of the Enhanced Defense Cooperation Agreement. “My hope is, is that at some point we’re going to be able to work cooperatively with China as well, because our goal here is simply to make sure that everybody is operating in a peaceful, responsible fashion.”

U.S. troops had been stationed in the Philippines from before World War II through its independence in 1946. Those bases and personnel remained in place until 1992. For more than a decade, U.S. special operations forces have deployed regularly to the Philippines to suppress terrorist networks like the Abu Sayyaf Group, or ASG, an extremist organization with the support of al-Qaeda.

“We are not a threat militarily to any country,” Aquino said, adding that the Philippine air force lacks even one fighter jet. But his troops will begin training on the V-22 Osprey for disaster response operations.

“We don’t have a comparable aircraft [to the V-22 Osprey],” Aquino said. “We have smaller helicopters. And we had 44 of our provinces devastated by Typhoon Haiyan. Now, the training will not just train our people on how to operate this particular aircraft, but more importantly, even help the Office of Civil Defense, for instance, manage this resource in case a storm or another natural disaster of the scale that transpired does happen.

(Related: Pentagon Pivots Within the Pivot, to Southeast Asia)

Part of the agreement signed Monday includes an additional $145 million from the U.S. Agency for International Development, or USAID, Obama said. That figure comes on top of the previously agreed upon $434 million in aid for development projects through 2016.

“My job as commander-in-chief is to look at what is it that is going to advance our security interests over the long term, to keep our military in reserve for where we absolutely need it,” Obama said. “There are going to be times where there are disasters and difficulties and challenges all around the world, and not all of those are going to be immediately solvable by us.”

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.