Home / DoD / Report: Pentagon Plans Combatant Command Realignment

Report: Pentagon Plans Combatant Command Realignment

PentagonThe Defense Department might consolidate and reorganize its combatant commands throughout the globe as sequestration and other budget cuts in the federal government continue, Military Times reported Sunday.

Marcus Weisgerber, writes the Pentagon could close down down two combatant commands and eight service-supporting commands, as well as combine its Northern and Southern Commands into the “Americas Command,” or “Western Command.”

Additionally, Weisgerber reports the plan would dissolve the Africa Command and distribute its responsibilities across the European and Central Commands, with Afghanistan and Pakistan folded into Central Command.

Weisgerber also reports that about 5,000 civilian and Pentagon personnel will be discharged or reassigned if the COCOM realignment pushes through.

“Combining combatant commands is certainly not something that we want to do, but something that we have to consider because all cuts have to be on the table,” Pentagon chief Chuck Hagel told the press on July 31, according to the report.

Military Times reports that the last major command that was dissolved was the U.S. Joint Forces Command in 2010.

The geographical COCOMs have increased forces by 7 percent, or about 1,000 personnel, between 2010 and 2012.

Check Also

Lead HHS Cyber Auditor Says Team ‘Well Aligned’ to Face Challenges

The head of cybersecurity at the Health and Human Services Department’s Office of the Inspector General recently said that he and his team are learning as much as they can about supply chain threats and application development security, to respond to such issues effectively, Federal News Network reported Friday. Jarvis Rodgers, HHS OIG Cybersecurity and IT Audit Division director, told Federal News Network via email that his unit is aware that risks related to global supply chains “present a unique set of challenges” and that poorly written code can result in costly and persistent security vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *