Order Code RS20557
Updated April 1, 2005
CRS Report for Congress
Received through the CRS Web
Navy Network-Centric Warfare Concept:
Key Programs and Issues for Congress
Ronald O’Rourke
Specialist in National Defense
Foreign Affairs, Defense, and Trade Division
Summary
Network-centric warfare (NCW) is a key element of defense transformation. Key
programs for implementing NCW in the Navy include the Cooperative Engagement
Capability (CEC), the Joint Fires Network (JFN), the IT-21 program, and ForceNet.
A related program is the Navy-Marine Corps Intranet (NMCI). Congress has closely
followed and expressed concern for some of these programs, particularly NMCI. This
report may be updated if developments warrant.
Network-Centric Warfare
The concept of network-centric warfare (NCW) is a key element of the Department
of Defense’s (DOD’s) transformation effort.1 NCW focuses on using computers, high-
speed data links, and networking software to link military personnel, platforms, and
formations into highly integrated local and wide-area networks. Within these networks,
personnel will share large amounts of critical information on a rapid and continuous basis.
DOD believes that NCW will dramatically improve combat capability and efficiency.
Key NCW Programs
Key programs for implementing NCW in the Navy include the Cooperative
Engagement Capability (CEC) program, the Joint Fires Network (JFN), the IT-21
investment strategy, and the ForceNet program. A related program is the Navy-Marine
Corps Intranet (NMCI). Each of these is discussed below.
CEC. The Cooperative Engagement Capability (CEC) system links Navy ships and
aircraft operating in a particular area into a single, integrated air-defense network in which
radar data collected by each platform is transmitted on a real-time (i.e., instantaneous)
1 For more on NCW, see CRS Report RL32411, Network Centric Warfare: Background and
Oversight Issues for Congress, by Clay Wilson. For more on defense transformation and naval
transformation, see CRS Report RL32238, Defense Transformation: Background and Oversight
Issues for Congress, by Ronald O’Rourke and CRS Report RS20851, Naval Transformation:
Background and Issues for Congress, by Ronald O’Rourke.
Congressional Research Service ˜ The Library of Congress
CRS-2
basis to the other units in the network. Units in the network share a common, composite,
real-time air-defense picture. CEC will permit a ship to shoot air-defense missiles at
incoming anti-ship missiles that the ship itself cannot see, using radar targeting data
gathered by other units in the network. It will also permit air-defense missiles fired by
one ship to be guided by other ships or aircraft. The Navy wants to install the system on
aircraft carriers, Aegis-equipped cruisers and destroyers, selected amphibious ships, and
E-2C Hawkeye carrier-based airborne early warning aircraft over the next several years.
The system has potential for being extended to include Army and Air Force systems.
Tests of CEC aboard Navy ships in 1998 revealed significant interoperability (i.e.,
compatibility) problems between CEC’s software and the software of the air-defense
systems on some ships, particularly surface combatants equipped with the Baseline 6
version (then the most recent version) of the Navy’s Aegis air defense system. In
response, the Navy undertook a major two-year effort to identify, understand, and fix the
problems. The CEC system, with the new fixes, passed its technical evaluation
(TECHEVAL) testing in February and March 2001 and final operational evaluation
(OPEVAL) testing in April and May 2001. In April 2002, DOD approved the program
to enter “Milestone III” in the acquisition process, and approved production of CEC
systems for FY2002 and FY2003 at a rate of 5 units per year. A further “Milestone B”
review of the program was scheduled for April 2003. DOD’s weapons-testing office in
2004 expressed concerns about the Navy’s plans for testing the CEC system.2
Raytheon has been the primary CEC contractor but in 2002 faced potential
competition from two firms — Lockheed and a small firm called Solipsys — for
developing the next version of CEC, called CEC Block II. Solipsys had devised an
alternative technical approach to CEC, called the Tactical Component Network (TCN).
Solipsys entered into a teaming arrangement with Lockheed to offer TCN to the Navy as
the technical approach for Block II. In late-December 2002, Raytheon announced that it
had agreed to purchase Solipsys. In early-February 2003, Raytheon and Lockheed
announced that they had formed a team to compete for the development of Block II.
Some observers expressed concern that these developments would reduce the Navy’s
ability to use competition in its acquisition strategy for Block II. As an apparent means
of preserving competition, the Navy in mid-2003 announced that it would incorporate
open-architecture standards into Block II divide the Block II development effort into a
series of smaller contracts for which various firms might be able to submit bids. In
December 2003, however, the Navy canceled plans for developing Block II in favor of a
new plan for developing a joint-service successor to Block I.
The conference report (H.Rept. 108-283 of September 24, 2003, page 290) on the
FY2004 defense appropriations act (H.R. 2658/P.L. 108-87 of September 30, 2003)
directed the Navy to keep the Appropriations committees informed on potential changes
to the CEC Block II acquisition strategy and stated that, if the Navy adopts a new
acquisition strategy, “the additional funds provided in this act for CEC Block 2 may be
merged with and be available for purposes similar to the purposes for which
appropriated.”
2 Jason Ma, “Navy Prepares For CEC Testing, Addresses DOT&E Report’s Concerns,” Inside
the Navy, Feb. 23, 2004.
CRS-3
JFN. The Joint Fires Network, earlier called the Naval Fires Network (NFN), links
naval forces operating in an area into a single real-time targeting network for coordinating
gunfire and missiles to attack surface and land targets, particularly time-critical targets.
The Navy experimented with JFN in several exercises and is now working to accelerate
the introduction of the system into the fleet. Concerns have been expressed that JFN, like
CEC, may use significant amounts of the Navy’s limited amount of available bandwidth.
As of December 2002, the Navy reportedly had deployed versions of the JFN system
aboard several ships, with the Marines, and at Bahrain, where the Navy’s 5th Fleet is
headquartered. Some ships are now equipped with JFN systems; additional systems could
be provided by either Northrop Grumman or an industry team composed of BAE,
Lockheed, and Raytheon. The House Appropriations Committee, in its report (H.Rept.
108-187 of July 2, 2003, page 251) on the FY2004 defense appropriations bill (H.R.
2658), directed “consolidation of the JFN/TES-N/JSIPS-N programs into a single
program management structure to streamline development and implementation of
programs in support of time critical strike and FORCEnet objectives.”
IT-21. IT-21, which stands for IT for the 21st Century, is the Navy’s investment
strategy for procuring the desktop computers, data links, and networking software needed
to establish an intranet for transmitting tactical and administrative data within and
between Navy ships. The IT-21 network uses commercial, off-the-shelf (COTS) desktop
computers and networking software that provide a multimedia (text, data, graphics,
images, voice, and video) organizational intranet similar to the Capitol Hill intranet or
corporate intranets. The Navy believes IT-21 will significantly improve U.S. naval
warfighting capability and achieve substantial cost reductions by significantly reducing
the time and number of people required to carry out various tactical and administrative
functions. FY2006 funding requested for IT-21 is intended “continues to accelerate
Integrated Shipboard Network Systems procurement and installation to achieve a Full
Operational Capability (FOC) for all platforms by FY 2007.”3
ForceNet. ForceNet (also written as FORCEnet) is the Navy’s overall approach
for linking various networks that contribute to naval NCW into a single capstone
information network for U.S. naval forces. The Navy has highlighted ForceNet as being
at the center of its Sea Power 21 transformation vision. Some observers have criticized
ForceNet for being insufficiently defined.4 The Naval Network Warfare Command issued
a functional concept document for ForceNet in February 2005, but Navy officials have
acknowledged that the concept is not yet adequately defined and stated that an improved
version of the document would be published in 2006.5
The conference report (H.Rept. 107-732 of October 9, 2002) on the FY2003 defense
appropriations bill (H.R. 5010/P.L. 107-248) expressed concern about “the lack of
specificity and documentation on the program,” and directed the Navy to submit a detailed
3 U.S., Department of the Navy, Office of the Budget, Highlights of the Department of the Navy
FY 2006/FY 2007 Budget. Washington, 2005. p. 5-10.
4 Malina Brown, “Van Riper: Navy’s ForceNet Too Broad, Mysterious To Be Meaningful,”
Inside the Navy, Apr. 7, 2003. See also Malina Brown, “Mullen Acknowledges ForceNet
Concept Not Clearly Understood,” Inside the Navy, July 5, 2004.
5 Jason Ma, “Naval Network Warfare Command Issues FORCEnet Concept Document,” Inside
the Navy, Feb. 14, 2005.
CRS-4
report on it by May 1, 2003 (page 279). The Senate Appropriations Committee, in its
report (S.Rept. 108-87 of July 10, 2003, page 156) on the FY2004 defense appropriations
bill (S. 1382), expressed support for the ForceNet program but also said it “is concerned
that no requirements have been approved or implemented and that there is duplication of
effort, especially in the areas of experimentation and demonstrations. The Committee
directs that the FORCEnet program establish these requirements, test them within the
Navy Warfighting Experimentations and Demonstrations line (PE0603758N), and release
the approved requirements changes as quickly as possible.”
NMCI. The Navy-Marine Corps Intranet (NMCI) is a corporate-style intranet that
will link more than 300 Navy and Marine Corps shore installations in much the same way
that the IT-21 effort will link together Navy ships. When completed, NMCI is to include
a total 305,372 computer work stations, or “seats.” The Navy’s FY2006 budget requests
$1.6 billion for the program. As of March 29, 2005, a total of 242,438 seats had been
delivered, or “cut over.” The Navy plans to achieve steady-state operation of all NMCI
seats during FY2006.
In October 2000, the Navy awarded an industry team led by Electronic Data Systems
(EDS) Corporation an $6.9-billion, five-year contract for installing, supporting, and
periodically upgrading the NMCI. In October 2002, Congress, through P.L. 107-254,
authorized a two-year extension to this contract, which is now worth $8.9 billion.
The NMCI implementation effort has experienced a number of challenges and
delays. A 2005 report from DOD’s weapons-testing office identifies problems found with
the program in 2003.6 On September 30, 2004, the Navy and EDS restructured the terms
of the NMCI contract to consolidate the number of performance measures and focus on
measuring results rather than implementation steps.7 User reaction to the system
reportedly has been mixed.8
On August 18 and 19, 2003, about 75% of the 97,000 NMCI seats then in operation
were affected by the “friendly” computer worm called “Welchia” that was aimed at
counterattacking the hostile “Blaster” computer virus. (The Blaster virus itself did not
affect the system). Only the unclassified part of the NMCI network was affected.
6 Jason Ma, “DOT&E Report Identifies NMCI Problem Areas Found During 2003 Test,” Inside
the Navy, February 7, 2005.
7 David McGlinchey, “Navy Says New Technology Contract Yields Rewards,” GovExec.com,
November 3, 2004; John T. Bennett, “Godwin: NMCI Contract Changes Should Remedy
Schedule Delays,” Inside the Navy, October 4, 2004; David McGlinchey, “Navy Streamlines Its
Intranet Contract,” GovExec.com, October 6, 2004; Crayton Harrison, “EDS, Navy Agree,”
Dallas Morning News,” October 2, 2004.
8 David McGlinchey,. “Netting Smiles,” Government Executive, October 15, 2004; Bob Brewin,
“England: NMCI On Satisfying Track,” Federal Computer Week (fcw.com), September 17, 2004;
David McGlinchey, “NMCI User Satisfaction Rising, Study Shows,” GovExec.com, August 5,
2004; David McGlinchey, “Navy Personnel Question Customer Satisfaction Survey Results,”
GovExec.com, August 2, 2004; William H. McMichael, “Still Getting ‘NMCI’d’,” Navy Times,
August 2, 2004; William H. McMichael, “Progress Is Slow For U.S. NMCI,” Defense News, July
26, 2004: 28; Matthew French, “Users Getting Comfortable With NMCI,” Federal Computer
Week, May 24, 2004.
CRS-5
Technicians contained and removed the worm; 95% the network was free of it by August
22, and a patch was installed to protect against reinfection. A Navy official said the
NMCI system had experienced 85,000 attempted attacks since 2001; an EDS official
stated that this was the first time the system was affected by a worm or virus. The Navy’s
chief information officer said the NMCI system’s security structure works well but that
the process for identifying vulnerabilities and installing patches may need to become
faster.9
The 106th Congress expressed concern over the difficulty of identifying the total cost
of the NMCI effort in Navy budget documents, the Navy’s ability to finance NMCI effort
without disrupting other important Navy programs, the pace at which the Navy planned
to implement NMCI, the Navy’s ability to properly structure and manage the huge NMCI
contract (the largest networking-services IT contract undertaken by a federal agency), the
potential impact of NMCI implementation on employees of existing naval networking and
telecommunications systems, and whether the network should be extended to cover
installations in the Marine Corps, which already had its own service-wide network.
In response, the Navy took actions to improve the visibility of NMCI costs in its
budget, stated that the NMCI would be financed to a large degree using funds
programmed for older IT procurement programs that the NMCI will supercede, stated that
implementing NMCI would have only a small net employment impact, and argued that
implementing NMCI in the Marine Corps as well as the Navy would result in greater
efficiencies and lower overall costs for the two services. At Congress’ direction, the plan
for implementing NMCI was restructured to begin with a smaller number of initial
installations, so that the success of the NMCI effort could be more carefully assessed
before the program was expanded to cover larger parts of the Navy and the Marine Corps.
The 107th Congress expressed substantial concerns regarding the implementation and
testing of the NMCI system. Section 362 of the conference report (H.Rept. 107-333 of
December 12, 2001) on the FY2002 defense authorization act (S. 1438/P.L. 107-107)
permitted the Navy to proceed with the NMCI project only after meeting certain testing
requirements. The provision also required the Navy to submit a report on the status of
NMCI testing and the implementation of the NMCI network, and to identify a single
individual whose sole responsibility will be to direct and oversee the NMCI program.
(The Navy in February 2002 announced that it had created a single program office to
manage the NMCI program, headed by an admiral. An NMCI senior executive council
headed by the Navy’s acquisition executive will provide senior-level review of the
program office.) The provision required GAO to study the impact of NMCI
implementation on the rate structure of naval shipyards and other repair depots. (GAO
submitted its report [GAO-03-33] on October 31, 2002.) The conference report also
expressed concern about delays in implementing the program and the resulting shortage
of data about the viability and performance of NMCI. (See pages 55-57 and 641-642.)
9 David McGlinchey, “Top Navy Officials Say Security Will Not Be Compromised In New
Network,” GovExec.com, June 23, 2004; William H. McMichael, “‘Friendly’ Virus Caused
NMCI Crash,” Navy Times, Aug. 19, 2003; Jason Ma, “Worm Hits 75 Percent Of NMCI
Workstations, But Most Are Now Clear,” Inside the Navy, Aug. 25, 2003; Jason Ma, “Navy CIO:
NMCI Security Is Fine, But Patch Process May Have To Change,” Inside the Navy, Oct. 6, 2003.
CRS-6
The House Appropriations Committee, in its report (H.Rept. 107-532 of June 25,
2002) on the FY2003 defense appropriation bill (H.R. 5010/P.L. 107-248), commented
extensively on the NMCI program, expressing concerns over the incorporation of
“legacy” computer programs into the network and the adequacy of the testing program.
(pages 198-199) The conference report on the bill (H.Rept. 107-732 of October 9, 2002)
expressed continuing concerns for the NMCI program and included a provision (Section
8118) prohibiting the Navy from ordering additional seats beyond the 160,000 already
authorized until certain conditions are met. (pages 48, 106-107, and 329)
In the 108th Congress, the conference report (H.Rept. 108-767 of October 8, 2004)
on the FY2005 defense authorization bill (H.R. 4200/P.L. 108-375 of October 28, 2004)
stated:
The conferees note that the Navy Marine Corps Intranet (NMCI) program is
working to transfer legacy applications and networks into the NMCI environment.
The conferees note that the scope of this process is large and the original goals
relating to termination or migration of legacy applications have not been achieved.
The conferees understand that there may be valid operational reasons for not
migrating some legacy applications into the NMCI environment. The Secretary of the
Navy should accelerate the migration or termination of legacy applications and
networks, and the conferees direct the Secretary to report to the Congress on the
progress in this area, as well as on a plan for the future funding of any legacy systems
support by September 30, 2005. The conferees take no position on matters of NMCI
contract administration and direct the Secretary to resolve any matters in contractual
arrangements relating to legacy application termination, transition, and support in a
manner consistent with established procedures and acquisition policies. (Page 642)
Issues for 109th Congress
Potential issues for Congress relating to specific NCW-related programs and NCW
in general include the following:
! Is the Navy making sufficient progress in implementing and testing the
NMCI system?
! Does the Navy have a clear and adequate acquisition strategy for
developing a successor to CEC Block I?
! Is the Navy taking sufficient actions for preventing, detecting, and
responding to attacks on NCW computer networks?
! Is the Navy taking sufficient steps to provide adequate satellite
bandwidth capacity to support NCW?
! Are Navy efforts to develop new tactics, doctrine, and organizations to
take full advantage of NCW sufficient?
! Has Navy has taken the concept of NCW adequately into account in
planning its future fleet architecture?
! Are NATO and other allied navies investing sufficiently in NCW-
enabling technologies? If not, will the Navy’s implementation of NCW
hinder U.S.-allied naval interoperability?