NATO Ramps Up Its Military Presence in Eastern Europe

A U.S. F15C Eagle jet fighter flies over Lithuania for a NATO exercise at the Siauliai airbase, April 2, 2014.

Mindaugas Kulbis/AP

AA Font size + Print

A U.S. F15C Eagle jet fighter flies over Lithuania for a NATO exercise at the Siauliai airbase, April 2, 2014.

NATO is stepping up reinforcements in the region as Defense Secretary Chuck Hagel meets with the Polish defense minister at the Pentagon. By Ben Watson

NATO is increasing security in the region as pro-Russian gunmen continue to stir up tensions in eastern Ukraine.

The additional measures involve “more planes in the air, more ships on the water, and more readiness on the land,” NATO Secretary General Anders Fogh Rasmussen said after a meeting of the alliance’s North Atlantic Council in Brussels on Wednesday.

“We will start to implement these measures straight away,” Rasmussen said, promising more assets if needed by other member nations.

Polish Defense Minister Tomasz Siemoniak is in Washington, D.C., to meet with Defense Secretary Chuck Hagel at the Pentagon on Thursday. Siemoniak has already signaled his country’s desire for more NATO assets —including putting a U.S. Army base in Poland.

“Poland is very much interested in increasing the allied American presence in Poland,” Siemoniak told Defense News.

“What’s important to us is to cover diverse areas with this presence,” he said. “But Army presence or [an] Army base would be a very visible testimony to the American boots on the Polish ground.”

NATO’s top military commander, Gen. Philip Breedlove said NATO was not ready to rule out sending U.S. troops to reassure the alliance’s eastern nations Lithuania, Latvia, Estonia and Poland — all of whom share a border with Russia.

The reinforcements follow reports this week of half a dozen armored personnel carriers commandeered from Ukraine’s armed forces being driven through the eastern city of Slovyansk flying the Russian flag. Breedlove released several photos last week showing Russia’s buildup of troops along Ukraine’s eastern border.

On Wednesday, Breedlove told reporters that the U.S. and NATO will keep its security measures in place throughout the end of the year “to assure our allies of our complete commitment.” 

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Top 5 Findings: Security of Internet of Things To Be Mission-Critical

    As federal agencies increasingly leverage these capabilities, government security stakeholders now must manage and secure a growing number of devices, including those being used remotely at the “edge” of networks in a variety of locations. With such security concerns in mind, Government Business Council undertook an indepth research study of federal government leaders in January 2017. Here are five of the key takeaways below which, taken together, paint a portrait of a government that is increasingly cognizant and concerned for the future security of IoT.

  • Coordinating Incident Response on Posts, Camps and Stations

    Effective incident response on posts, camps, and stations is an increasingly complex challenge. An effective response calls for seamless conversations between multiple stakeholders on the base and beyond its borders with civilian law enforcement and emergency services personnel. This whitepaper discusses what a modern dispatch solution looks like -- one that brings together diverse channels and media, simplifies the dispatch environment and addresses technical integration challenges to ensure next generation safety and response on Department of Defense posts, camps and stations.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation


When you download a report, your information may be shared with the underwriters of that document.