Where Will CENTCOM’s Post-War Funding Come From?

Explosive Ordnance Technicians assigned to CTG 56.1 conduct mine countermeasure exercises during Exercise Eager Lion 2014 in the Gulf of Aqaba, Jordan, on May 28, 2014.

U.S. Navy photo by Mass Communication Specialist 1st Class Michael Sandberg

AA Font size + Print

Explosive Ordnance Technicians assigned to CTG 56.1 conduct mine countermeasure exercises during Exercise Eager Lion 2014 in the Gulf of Aqaba, Jordan, on May 28, 2014.

U.S. Central Command won’t be able to rely on the Pentagon’s war budget anymore to pay for counterterrorism operations around the world, a new report warns. By Stephanie Gaskell

U.S. Central Command is responsible for some of the most volatile places in the world, including Iraq, Afghanistan, Syria, Pakistan, Iran, Yemen and Egypt, so not surprisingly its budget has increased greatly since 2001. Most of the command’s funding has come from the Pentagon’s Overseas Contingency Operations budget, a separate pot of money set aside to pay for the wars in Iraq and Afghanistan over the past decade.

Now faced with a new post-war counterterrorism mission laid out by President Barack Obama in his West Point speech last month, the command needs to figure out how it’s going to pay for it — and soon, according to a new Government Accountability Office report.

The report said that the number of authorized military and civilian positions at CENTCOM grew 70 percent from 1,590 in fiscal year 2001 to 2,730 in fiscal year 2013, with the majority of those new positions coming from its intelligence directorate and theater special operations command.

Of the $793 million in total headquarters costs, Navy and Marine Corps service component commands and theater special operations command for fiscal year 2013, about 76 percent, or $600 million, was funded through the OCO budget. Figures for the Army and Air Force service component commands were not available, GAO said.

Now that the war in Afghanistan is officially ending, CENTCOM needs to get to “normal, or steady-state, operations,” GAO said, and begin planning for its post-war budgets.

Obama’s fiscal year 2015 budget request includes $495.6 billion for DOD’s base budget and $79.4 billion for the OCO fund, but said that was just a placeholder until a decision is made on whether U.S. troops will stay in Afghanistan after the end of the year. Congress appears willing to keep funding overseas contingency operations after the war in Afghanistan officially ends, but several lawmakers have warned that the OCO budget can no longer be used to pay for non-war items, like operations and maintenance and other shortfalls created by sequestration cuts.

Still, the OCO budget will clearly shrink in coming years, likely to $30 billion in fiscal year 2016 through fiscal year 2019, even as Obama vows to continue the war on terror. The money will have to come from DOD’s base budget, which the services, with their already strained budgets, are worried about. Obama is also asking for an additional $5 billion to pay for counterterrorism operations around the world.

Read the full report here.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.