Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
Congressional Research Service Report for Congress
Specialist in National Defense
Foreign Affairs, Defense, and Trade Division
Congressional Research Service, The Library of Congress
Updated 31 May 2005
SummaryNetwork-centric warfare (NCW) is a key element of defense transformation. Key programs for implementing NCW in the Navy include the Cooperative Engagement Capability (CEC), the Joint Fires Network (JFN), the IT-21 program, and ForceNet. A related program is the Navy-Marine Corps Intranet (NMCI). Congress has closely followed and expressed concern for some of these programs, particularly NMCI. This report may be updated if developments warrant.
Network-Centric WarfareThe concept of network-centric warfare (NCW) is a key element of the Department of Defense's (DOD's) transformation effort.1 NCW focuses on using computers, highspeed data links, and networking software to link military personnel, platforms, and formations into highly integrated local and wide-area networks. Within these networks, personnel will share large amounts of critical information on a rapid and continuous basis. DOD believes that NCW will dramatically improve combat capability and efficiency.
Key NCW ProgramsCEC. The Cooperative Engagement Capability (CEC) system links Navy ships and aircraft operating in a particular area into a single, integrated air-defense network in which radar data collected by each platform is transmitted on a real-time (i.e., instantaneous) basis to the other units in the network. Units in the network share a common, composite, real-time air-defense picture. CEC will permit a ship to shoot air-defense missiles at incoming anti-ship missiles that the ship itself cannot see, using radar targeting data gathered by other units in the network. It will also permit air-defense missiles fired by
one ship to be guided by other ships or aircraft. The Navy wants to install the system on aircraft carriers, Aegis-equipped cruisers and destroyers, selected amphibious ships, and E-2C Hawkeye carrier-based airborne early warning aircraft over the next several years. The system has potential for being extended to include Army and Air Force systems.
Tests of CEC aboard Navy ships in 1998 revealed significant interoperability (i.e., compatibility) problems between CEC's software and the software of the air-defense systems on some ships, particularly surface combatants equipped with the Baseline 6 version (then the most recent version) of the Navy's Aegis air defense system. In response, the Navy undertook a major effort to identify, understand, and fix the problems. The CEC system, with the new fixes, passed its technical evaluation (TECHEVAL) testing in February and March 2001 and final operational evaluation (OPEVAL) testing in April and May 2001.
Raytheon has been the primary CEC contractor but in 2002 faced potential competition from two firms -- Lockheed and a small firm called Solipsys -- for developing the next version of CEC, called CEC Block II. Solipsys had devised an alternative technical approach to CEC, called the Tactical Component Network (TCN). Solipsys entered into a teaming arrangement with Lockheed to offer TCN to the Navy as the technical approach for Block II. In late-December 2002, Raytheon announced that it had agreed to purchase Solipsys. In early-February 2003, Raytheon and Lockheed announced that they had formed a team to compete for the development of Block II. Some observers expressed concern that these developments would reduce the Navy's ability to use competition in its acquisition strategy for Block II. As an apparent means of preserving competition, the Navy in mid-2003 announced that it would incorporate open-architecture standards into Block II [and] divide the Block II development effort into a series of smaller contracts for which various firms might be able to submit bids. In December 2003, however, the Navy canceled plans for developing Block II in favor of a new plan for developing a joint-service successor to Block I.
The conference report (H.Rept. 108-283, page 290) on the FY2004 defense appropriations act (H.R. 2658/P.L. 108-87) directed the Navy to keep the Appropriations committees informed on potential changes to the CEC Block II acquisition strategy and stated that, if the Navy adopts a new acquisition strategy, "the additional funds provided in this act for CEC Block 2 may be merged with and be available for purposes similar to the purposes for which appropriated."
JFN. The Joint Fires Network, earlier called the Naval Fires Network (NFN), links naval forces operating in an area into a single real-time targeting network for coordinating gunfire and missiles to attack surface and land targets, particularly time-critical targets. The Navy experimented with JFN in several exercises and is now working to accelerate the introduction of the system into the fleet. Concerns have been expressed that JFN, like CEC, may use significant amounts of the Navy's limited amount of available bandwidth. As of December 2002, the Navy reportedly had deployed versions of the JFN system aboard several ships, with the Marines, and at Bahrain, where the Navy's 5th Fleet is headquartered. Some ships are now equipped with JFN systems; additional systems could be provided by either Northrop Grumman or an industry team composed of BAE, Lockheed, and Raytheon. The House Appropriations Committee, in its report (H.Rept. 108-187, page 251) on the FY2004 defense appropriations bill (H.R. 2658), directed "consolidation of the JFN/TES-N/JSIPS-N programs into a single program management
structure to streamline development and implementation of programs in support of time critical strike and FORCEnet objectives."
IT-21. IT-21, which stands for IT for the 21st Century, is the Navy's investment strategy for procuring the desktop computers, data links, and networking software needed to establish an intranet for transmitting tactical and administrative data within and between Navy ships. The IT-21 network uses commercial, off-the-shelf (COTS) desktop computers and networking software that provide a multimedia (text, data, graphics, images, voice, and video) organizational intranet similar to the Capitol Hill intranet or corporate intranets. The Navy believes IT-21 will significantly improve U.S. naval warfighting capability and achieve substantial cost reductions by significantly reducing the time and number of people required to carry out various tactical and administrative functions. FY2006 funding requested for IT-21 is intended "continues to accelerate Integrated Shipboard Network Systems procurement and installation to achieve a Full Operational Capability (FOC) for all platforms by FY 2007."2
ForceNet. ForceNet (also written as FORCEnet) is the Navy's overall approach for linking various networks that contribute to naval NCW into a single capstone information network for U.S. naval forces. The Navy has highlighted ForceNet as being at the center of its Sea Power 21 transformation vision. Some observers have criticized ForceNet for being insufficiently defined.3 The Naval Network Warfare Command issued a functional concept document for ForceNet in February 2005, but Navy officials have acknowledged that the concept is not yet adequately defined and stated that an improved version of the document would be published in 2006.4
The conference report (H.Rept. 107-732) on the FY2003 defense appropriations bill (H.R. 5010/P.L. 107-248) expressed concern about "the lack of specificity and documentation on the program," and directed the Navy to submit a detailed report on it by May 1, 2003 (page 279). The Senate Appropriations Committee, in its report (S.Rept. 108-87, page 156) on the FY2004 defense appropriations bill (S. 1382), expressed support for the ForceNet program but also said it "is concerned that no requirements have been approved or implemented and that there is duplication of effort, especially in the areas of experimentation and demonstrations. The Committee directs that the FORCEnet program establish these requirements, test them within the Navy Warfighting Experimentations and Demonstrations line (PE0603758N), and release the approved requirements changes as quickly as possible."
NMCI. Although not an NCW system itself, a significant program related to NCW is the Navy-Marine Corps Intranet (NMCI), which is a corporate-style intranet that will link more than 300 Navy and Marine Corps shore installations in much the same way that the IT-21 effort will link together Navy ships. When completed, NMCI is to include a
total [of] 305,372 computer work stations, or "seats." The Navy's FY2006 budget requests $1.6 billion for the program. As of May 31, 2005, a total of 247,597 seats had been delivered, or "cut over." The Navy plans to achieve steady-state operation of all NMCI seats during FY2006. In October 2000, the Navy awarded an industry team led by Electronic Data Systems (EDS) Corporation an $6.9-billion, five-year contract for installing, supporting, and periodically upgrading the NMCI. In October 2002, Congress, through P.L. 107-254, authorized a two-year extension to this contract, which is now worth $8.9 billion.
The NMCI implementation effort has experienced a number of challenges and delays. A 2005 report from DOD's weapons-testing office identifies problems found with the program in 2003.5 On September 30, 2004, the Navy and EDS restructured the terms of the NMCI contract to consolidate the number of performance measures and focus on measuring results rather than implementation steps.6 User reaction to the system reportedly has been mixed.7
On August 18 and 19, 2003, about 75% of the 97,000 NMCI seats then in operation were affected by the "friendly" computer worm called "Welchia" that was aimed at counterattacking the hostile "Blaster" computer virus. (The Blaster virus itself did not affect the system). Only the unclassified part of the NMCI network was affected. Technicians contained and removed the worm; 95% [of] the network was free of it by August 22, and a patch was installed to protect against reinfection. A Navy official said the NMCI system had experienced 85,000 attempted attacks since 2001; an EDS official stated that this was the first time the system was affected by a worm or virus. The Navy's chief information officer said the NMCI system's security structure works well but that the process for identifying vulnerabilities and installing patches may need to become faster.8
The 106th Congress expressed concern over the difficulty of identifying the total cost of the NMCI effort in Navy budget documents, the Navy's ability to finance NMCI effort without disrupting other important Navy programs, the pace at which the Navy planned to implement NMCI, the Navy's ability to properly structure and manage the huge NMCI contract (the largest networking-services IT contract undertaken by a federal agency), the potential impact of NMCI implementation on employees of existing naval networking and telecommunications systems, and whether the network should be extended to cover installations in the Marine Corps, which already had its own service-wide network.
In response, the Navy took actions to improve the visibility of NMCI costs in its budget, stated that the NMCI would be financed to a large degree using funds programmed for older IT procurement programs that the NMCI will supercede, stated that implementing NMCI would have only a small net employment impact, and argued that implementing NMCI in the Marine Corps as well as the Navy would result in greater efficiencies and lower overall costs for the two services. At Congress' direction, the plan for implementing NMCI was restructured to begin with a smaller number of initial installations, so that the success of the NMCI effort could be more carefully assessed before the program was expanded to cover larger parts of the Navy and the Marine Corps.
The 107th Congress expressed substantial concerns regarding the implementation and testing of the NMCI system. Section 362 of the conference report (H.Rept. 107-333 of December 12, 2001) on the FY2002 defense authorization act (S. 1438/P.L. 107-107) permitted the Navy to proceed with the NMCI project only after meeting certain testing requirements. The provision also required the Navy to submit a report on the status of NMCI testing and the implementation of the NMCI network, and to identify a single individual whose sole responsibility will be to direct and oversee the NMCI program. (The Navy in February 2002 announced that it had created a single program office to manage the NMCI program, headed by an admiral. An NMCI senior executive council headed by the Navy's acquisition executive will provide senior-level review of the program office.) The provision required GAO to study the impact of NMCI implementation on the rate structure of naval shipyards and other repair depots. (GAO submitted its report [GAO-03-33] on October 31, 2002.) The conference report also expressed concern about delays in implementing the program and the resulting shortage of data about the viability and performance of NMCI. (See pages 55-57 and 641-642.)
The House Appropriations Committee, in its report (H.Rept. 107-532) on the FY2003 defense appropriation bill (H.R. 5010/P.L. 107-248), commented extensively on the NMCI program, expressing concerns over the incorporation of "legacy" computer programs into the network and the adequacy of the testing program. (pages 198-199) The conference report on the bill (H.Rept. 107-732) expressed continuing concerns for the NMCI program and included a provision (Section 8118) prohibiting the Navy from ordering additional seats beyond the 160,000 already authorized until certain conditions are met. (Pages 48, 106-107, and 329.)
In the 108th Congress, the conference report (H.Rept. 108-767) on the FY2005 defense authorization bill (H.R. 4200/P.L. 108-375) stated:
The conferees note that the Navy Marine Corps Intranet (NMCI) program is working to transfer legacy applications and networks into the NMCI environment. The conferees note that the scope of this process is large and the original goals
relating to termination or migration of legacy applications have not been achieved. The conferees understand that there may be valid operational reasons for not migrating some legacy applications into the NMCI environment. The Secretary of the Navy should accelerate the migration or termination of legacy applications and networks, and the conferees direct the Secretary to report to the Congress on the progress in this area, as well as on a plan for the future funding of any legacy systems support by September 30, 2005. The conferees take no position on matters of NMCI contract administration and direct the Secretary to resolve any matters in contractual arrangements relating to legacy application termination, transition, and support in a manner consistent with established procedures and acquisition policies. (Page 642)
Issues for 109th CongressPotential issues for Congress relating to specific NCW-related programs and NCW in general include the following:
- Is the Navy making sufficient progress in implementing and testing the NMCI system?
- Does the Navy have a clear and adequate acquisition strategy for developing a successor to CEC Block I?
- Is the Navy taking sufficient actions for preventing, detecting, and responding to attacks on NCW computer networks?
- Is the Navy taking sufficient steps to provide adequate satellite bandwidth capacity to support NCW?
- Are Navy efforts to develop new tactics, doctrine, and organizations to take full advantage of NCW sufficient?
- Has [the] Navy taken the concept of NCW adequately into account in planning its future fleet architecture?
- Are NATO and other allied navies investing sufficiently in NCWenabling technologies? If not, will the Navy's implementation of NCW hinder U.S.-allied naval interoperability?
Legislative Activity For FY2006FY2006 Defense Authorization Bill (H.R. 1815/S. 1042). The House and Senate Armed Services Committees, in their reports on H.R. 1815 and S. 1042 (H.Rept. 109-89, page 178, and S.Rept. 109-69, pages 108-109, respectively), expressed satisfaction with the Navy's efforts to improve interoperability between the CEC system and other combat direction systems and ended a requirement established in the conference report (H.Rept. 105-736) on the FY1999 defense authorization act (P.L. 105-261) for the Navy to report to Congress on these efforts on a quarterly basis.
Footnotes:1. For more on NCW, see CRS Report RL32411, Network Centric Warfare: Background and Oversight Issues for Congress, by Clay Wilson. For more on defense transformation and naval transformation, see CRS Report RL32238, Defense Transformation: Background and Oversight Issues for Congress, by Ronald O'Rourke and CRS Report RS20851, Naval Transformation: Background and Issues for Congress, by Ronald O'Rourke.
2. U.S. Department of the Navy, Office of the Budget, Highlights of the Department of the Navy FY 2006/FY 2007 Budget, pp. 5-10.
3. Malina Brown, "Van Riper: Navy's ForceNet Too Broad, Mysterious To Be Meaningful," Inside the Navy, Apr. 7, 2003. See also Malina Brown, "Mullen Acknowledges ForceNet Concept Not Clearly Understood," Inside the Navy, July 5, 2004.
4. Jason Ma, "Naval Network Warfare Command Issues FORCEnet Concept Document," Inside the Navy, Feb. 14, 2005.
5. Jason Ma, "DOT&E Report Identifies NMCI Problem Areas Found During 2003 Test," Inside the Navy, Feb. 7, 2005.
6. David McGlinchey, "Navy Says New Technology Contract Yields Rewards," GovExec.com, Nov. 3, 2004; John T. Bennett, "Godwin: NMCI Contract Changes Should Remedy Schedule Delays," Inside the Navy, Oct. 4, 2004; David McGlinchey, "Navy Streamlines Its Intranet Contract," GovExec.com, Oct. 6, 2004; Crayton Harrison, "EDS, Navy Agree," Dallas Morning News, Oct. 2, 2004.
7. David McGlinchey, "Netting Smiles," Government Executive, Oct. 15, 2004; Bob Brewin, "England: NMCI On Satisfying Track," Federal Computer Week (fcw.com), Sept. 17, 2004; David McGlinchey, "NMCI User Satisfaction Rising, Study Shows," GovExec.com, Aug. 5, 2004; David McGlinchey, "Navy Personnel Question Customer Satisfaction Survey Results," GovExec.com, Aug. 2, 2004; William H. McMichael, "Still Getting NMCI'd'," Navy Times, Aug. 2, 2004; William H. McMichael, "Progress Is Slow For U.S. NMCI," Defense News, July 26, 2004: 28; Matthew French, "Users Getting Comfortable With NMCI," Federal Computer Week, May 24, 2004.
8. David McGlinchey, "Top Navy Officials Say Security Will Not Be Compromised In New Network," GovExec.com, June 23, 2004; William H. McMichael, "Friendly' Virus Caused NMCI Crash," Navy Times, Aug. 19, 2003; Jason Ma, "Worm Hits 75 Percent Of NMCI Workstations, But Most Are Now Clear," Inside the Navy, Aug. 25, 2003; Jason Ma, "Navy CIO: NMCI Security Is Fine, But Patch Process May Have To Change," Inside the Navy, Oct. 6, 2003.
[The opinions expressed in this publication are those of the author and do not necessarily represent the views of the Naval History & Heritage Command