Report: Delays in Missile Defense for Poland, Romania

A test launch of the Standard Missile-3 from the USS Lake Erie

Navy Media Content Services

AA Font size + Print

A test launch of the Standard Missile-3 from the USS Lake Erie

After Russia’s move in Crimea, a new report says the antimissile capabilities, meant to protect Europe from an attack by Iran, are behind schedule. By Rachel Oswald

U.S. congressional auditors have concluded the Pentagon is likely being too optimistic in its time schedule for achieving certain antimissile capabilities in Europe.

The Defense Department presently intends to declare the second and third phases of the European Phased Adaptive Approach “technically capable” in 2015 and 2018. This is in spite of the fact that problems getting the plan’s next-generation ballistic missile technology to work correctly have already caused the department to postpone deployment of some capabilities as compared to original plans, the Government Accountability Office concluded in a  Friday report.

The Obama administration’s blueprint for supporting NATO missile defense involves the gradual fielding through 2020 of increasingly capable interceptors at sea and at bases in Poland and in Romania. The stated aim of the antimissile deployments is to protect Europe from potential ballistic missile attacks by Iran, though Russia has long accused NATO of covertly seeking to undermine strategic nuclear stability on the continent.

Senior U.S. officials have consistently said that implementation of the European missile defense plan is “on track.” But the findings from the GAO picture suggest that some time schedules within the plan could be imperiled because of technology- and acquisition-related challenges.

The United States declared Phase 1 of the plan technically active in December 2011 with the deployment of an AN/TPY-2 radar in Turkey and the fielding of warship-mounted Standard Missile 3 Block 1A interceptors in the Mediterranean. However, an initiative to augment by 2014 the existing capability to defeat short-range ballistic missile attacks will now not come until 2015, “due in part to addressing limitations identified following Phase 1 declaration,” GAO officials said.

Additionally, the Pentagon’s Missile Defense Agency has decided to split implementation of Phase 2 into two parts — a “core” capability to be announced in 2015 and an upgrade to come in 2017. Congressional auditors found that this schedule “is on a higher risk path than originally planned,” as “activities initially expected to be sequential are now concurrent.”

The second phase is focused on expanding how much of European territory is to be protected from short- and medium-range ballistic missile threats. As part of Phase 2, the U.S. military has already sent the first of four planned Aegis warships equipped with Standard Missile 3 Block 1B interceptors to Spain. The deployment of a land-based version of the Aegis system equipped with 1B interceptors in Romania has yet to take place

The Pentagon now plans to field Phase 3 assets in 2020 — two years later than was originally envisioned. The third and final phase is to involve the deployment of SM-3 Block 2A interceptors in Poland for protection against potential intermediate-range missile attacks. The GAO report found that “some participating systems are too early in development to assess risks,” but that “development schedules for some systems are concurrent with Phase 3 integration activities” rather than preceding them.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.