{"id":2473,"date":"2012-04-20T13:46:26","date_gmt":"2012-04-20T13:46:26","guid":{"rendered":"https:\/\/lexingtoninstitute.org\/?p=2473"},"modified":"2013-11-12T15:37:23","modified_gmt":"2013-11-12T15:37:23","slug":"army-plans-leave-soldiers-vulnerable-to-air-threats","status":"publish","type":"post","link":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/","title":{"rendered":"Army Plans Leave Soldiers Vulnerable To Air Threats"},"content":{"rendered":"

You don’t need a crystal ball to figure out what the next big threat to America’s soldiers will be. It won’t be improvised explosive devices or cyber attacks, because the Army is spending lots of money preparing for those challenges. The next big threat will come from the air. Why? Because after ten years of fighting enemies with no air forces, the Army has grown so oblivious to overhead threats that it has dismantled its plans for replacing Cold War air defenses. So of course, that’s the weakness future enemies will seek to exploit (which is why the phrase “asymmetric aggression” was invented).<\/p>\n

Army planners were warning a decade ago that this would happen, and now unmanned aircraft and short-range ballistic missiles are beginning to pop up just about anyplace the service might deploy in the future. Shifting the focus of national strategy from the Persian Gulf to the Western Pacific won’t alleviate this problem, it will make it worse. China is rich enough and North Korea is crazy enough to mount air assaults against U.S. ground forces far worse than anything the Iranians can even imagine. And the U.S. Air Force will be at a disadvantage defending friendly ground forces in the Western Pacific, given the long distances, thin basing structure, and leisurely pace at which survivable fighters are being introduced into the fleet (it was supposed to have 1,600 stealthy F-35 fighters by 2017, but now it looks likely to have less than 400).<\/p>\n

The Army’s main ground-based air defense system, Patriot, has served it well, but doesn’t look capable of coping with emerging air threats in the absence of major upgrades. For starters, it lacks the ability to provide a 360-degree defense of threatened troops, it takes a long time to deploy, and it relies on obsolete software called Jovial (the same 1980s-era code used on the B-2 bomber). So killing just about every item in the Army’s next-generation air defense plan has put future warfighters in quite a bind at a time when emerging adversaries are likely to have cruise missiles, unmanned aircraft, tactical ballistic missiles, and other weapons with which to attack troops from above. Despite competing priorities and the looming specter of budget sequestration, Army leaders need to find some fix for their lagging air defenses.<\/p>\n

It seems like the simplest way to deal with this problem is to leverage next-generation technology the Pentagon has already paid for in the canceled Medium Extended Air Defense System (MEADS). MEADS was developed by the U.S., Germany and Italy to replace Patriot, and fell out of favor mainly because threats didn’t materialize at the rate planners expected. But if MEADS technology is simply discarded the way technology for Comanche, Crusader and the Future Combat System were, that will give future aggressors an incentive to focus their efforts on the Army’s weak air defenses. Most of what’s deficient in Patriot — the coverage of the radars, the mobility of the launchers, etc. — was addressed by MEADS. Just because the Army no longer plans to buy the full-up system doesn’t mean it can’t harvest the technology.<\/p>\n

For some reason, lawmakers who rail against future weapons spending they believe is unnecessary don’t utter a peep when money that has already been spent is squandered. In the case of MEADS, the U.S. share of sunk money will total $2.4 billion by the time the program goes belly-up at the end of fiscal 2013. Instead of just walking away from all the technology those expenditures have purchased, it would make more sense to adapt what has been bought to dealing with threats we know are coming. If we don’t, the threats are likely to show up much sooner.<\/p>\n","protected":false},"excerpt":{"rendered":"

You don’t need a crystal ball to figure out what the next big threat to America’s soldiers will be. It won’t be improvised explosive devices or cyber attacks, because the Army is spending lots of money preparing for those challenges. The…<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"yoast_head":"\nArmy Plans Leave Soldiers Vulnerable To Air Threats - Lexington Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Army Plans Leave Soldiers Vulnerable To Air Threats - Lexington Institute\" \/>\n<meta property=\"og:description\" content=\"You don't need a crystal ball to figure out what the next big threat to America's soldiers will be. It won't be improvised explosive devices or cyber attacks, because the Army is spending lots of money preparing for those challenges. The...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Lexington Institute\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-20T13:46:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-11-12T15:37:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Loren B. Thompson, Ph.D\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:site\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Loren B. Thompson, Ph.D\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/\",\"name\":\"Army Plans Leave Soldiers Vulnerable To Air Threats - Lexington Institute\",\"isPartOf\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\"},\"datePublished\":\"2012-04-20T13:46:26+00:00\",\"dateModified\":\"2013-11-12T15:37:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/aaeeb711a55ba7c7014d181acea7ddc7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lexingtoninstitute.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Army Plans Leave Soldiers Vulnerable To Air Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/\",\"name\":\"Lexington Institute\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/aaeeb711a55ba7c7014d181acea7ddc7\",\"name\":\"Loren B. Thompson, Ph.D\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/734316427320542b8e9dc2ad24d0d1bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/734316427320542b8e9dc2ad24d0d1bd?s=96&d=mm&r=g\",\"caption\":\"Loren B. Thompson, Ph.D\"},\"url\":\"https:\/\/www.lexingtoninstitute.org\/author\/loren-b-thompson-ph-d\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Army Plans Leave Soldiers Vulnerable To Air Threats - Lexington Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/","og_locale":"en_US","og_type":"article","og_title":"Army Plans Leave Soldiers Vulnerable To Air Threats - Lexington Institute","og_description":"You don't need a crystal ball to figure out what the next big threat to America's soldiers will be. It won't be improvised explosive devices or cyber attacks, because the Army is spending lots of money preparing for those challenges. The...","og_url":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/","og_site_name":"Lexington Institute","article_published_time":"2012-04-20T13:46:26+00:00","article_modified_time":"2013-11-12T15:37:23+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png","type":"image\/png"}],"author":"Loren B. Thompson, Ph.D","twitter_card":"summary_large_image","twitter_creator":"@LexNextDC","twitter_site":"@LexNextDC","twitter_misc":{"Written by":"Loren B. Thompson, Ph.D","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/","url":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/","name":"Army Plans Leave Soldiers Vulnerable To Air Threats - Lexington Institute","isPartOf":{"@id":"https:\/\/www.lexingtoninstitute.org\/#website"},"datePublished":"2012-04-20T13:46:26+00:00","dateModified":"2013-11-12T15:37:23+00:00","author":{"@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/aaeeb711a55ba7c7014d181acea7ddc7"},"breadcrumb":{"@id":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lexingtoninstitute.org\/army-plans-leave-soldiers-vulnerable-to-air-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lexingtoninstitute.org\/"},{"@type":"ListItem","position":2,"name":"Army Plans Leave Soldiers Vulnerable To Air Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.lexingtoninstitute.org\/#website","url":"https:\/\/www.lexingtoninstitute.org\/","name":"Lexington Institute","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/aaeeb711a55ba7c7014d181acea7ddc7","name":"Loren B. Thompson, Ph.D","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/734316427320542b8e9dc2ad24d0d1bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/734316427320542b8e9dc2ad24d0d1bd?s=96&d=mm&r=g","caption":"Loren B. Thompson, Ph.D"},"url":"https:\/\/www.lexingtoninstitute.org\/author\/loren-b-thompson-ph-d\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/2473"}],"collection":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/comments?post=2473"}],"version-history":[{"count":0,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/2473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/media?parent=2473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/categories?post=2473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/tags?post=2473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}