recommended reading

New Navy Shipboard Net Key to Information Dominance

The guided-missile destroyer USS Higgins operates off the coast of Haiti.

The guided-missile destroyer USS Higgins operates off the coast of Haiti. // U.S. Navy

The Navy’s $2.5 billion shipboard-network contract awarded Wednesday is critical to the service’s push for information dominance in future wars.

That’s according to Rear Adm. Christian Becker, the program executive officer for command, control, communications and intelligence at the Space and Naval Warfare Systems Command, who discussed the service’s plans during a press briefing yesterday.

The recent contract award follows an Aug. 7 speech at SPAWAR by Chief of Naval Operations Adm. Jonathan Greenert, who said the San Diego-based command is the technical agent for information dominance and “is also the technical agent for a new era in Navy and naval warfare. Control of the information is going to be the key to the future.”

Becker said the Navy’s Consolidated Afloat Networks and Enterprise Services, or CANES, program will automate shipboard cyber systems. Tests of CANES hardware and software earlier this month on the USS Higgins showed cyber software updates for multiple shipboards systems can be done automatically and remotely, Becker said, rather than sailors having to manually make the changes.

System Includes Cyber-Protection Tools

Capt. William “Ben” McNeal, Navy tactical networks program manager, said during Thursday's press briefing cyber tools available from CANES include firewalls and intrusion detection systems.

Cyber systems are just one of five domains in CANES that will provide standardized shipboard systems, McNeal said. The other CANES domains are systems management, the core enterprise-services domain which includes some 200 applications, the communications domain built around routers and switchers, and a computing infrastructure of standardized end user devices.

McNeal declined to identify CANES hardware or software by brand name due to “acquisition sensitivity”.

The Navy currently plans to install CANES on at least 180 ships by 2022, but that number could increase as new ships are added to the fleet, McNeal said. CANES software will be upgraded every two years and hardware every four years over the eight-year life of the contract, he said.

System Will Connect Shipboard Net to the Cloud -- Eventually

SPAWAR eventually wants to use CANES to connect shipboard systems to information stored in the cloud, a challenge considering the bandwidth limitations of satellite connections, Becker acknowledged. SPAWAR is working with the Office of Naval Research to figure out how to tap into the cloud from deployed ships, he said.

Because aircraft carriers and large deck amphibious ships have more robust satellite connections than smaller ships, they would be the first to tap into cloud based data, Becker said.

Five companies -- BAE Systems Technology Solutions & Services, General Dynamics C4 Systems, Global Technical Systems, Northrop Grumman Systems Corp. and Serco, Inc. -- all won indefinite-delivery, indefinite-quantity, firm-fixed-price, cost-plus-fixed-fee contracts for CANES and will compete for task orders through the life of the contract. To start, each will be awarded a task order to equip a destroyer with the CANES network. McNeal said. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.