Back to news

March 20, 2020 | International, Naval, C4ISR

The Navy will test pushing new software to ships at sea

By: Mike Gruss

The Navy plans to test next year whether it can push new software — not just patches but new algorithms and battle-management aids — to its fleet without the assistance of in-person installation teams.

Navy officials plan to send the first upgrades to the aircraft carrier Abraham Lincoln's C4I systems for a test in early 2021, officials said during a March 3 media roundtable at the West 2020 trade show in San Diego.

Today, Navy teams frequently deliver security patches to ships, but that process does not allow for new capabilities. The reason is because service officials fear that one change to the ship's software could have unintended consequences, creating a cascading effect and inadvertently breaking other parts of the system.

But in recent years, Navy officials have embraced the idea of digital twins, which are cloud-based replicas of the software running on a ship's systems. This setup allows Navy engineers to experiment with how new code will react with the existing system. It also helps software developers work on the same baseline and avoid redundancies. Ultimately, the setup offers Navy officials a higher degree of confidence that the software they're uploading will work without any surprises.

The Navy completed its first digital twin, the Lincoln, in fall 2019 and has started building a digital twin of the aircraft carrier Theodore Roosevelt. Eventually Navy leaders expect to complete a digital twin of all the service's ships. However, only those in the fleet that have already been upgraded to a certain version of the Navy's tactical afloat network, known as the Consolidate Afloat Networks and Enterprise Services program, or CANES, would be eligible for the over-the-air updates.

“In the Information Warfare community, software is a weapon,” Rear Adm. Kathleen M. Creighton, the Navy's cybersecurity division director in the Office of the Deputy Chief of Naval Operations for Information Warfare, told C4ISRNET in a March 17 statement. “If we were to ask a warfighter if it would be valuable to conceptualize, order and receive additional kinetic capability at sea, of course the answer would be yes. The same is true of software.

“In an ever-dynamic warfighting environment, the ability to improve, add to, or build new capabilities quickly has extraordinary value. We believe our sailors on the front line are the best positioned to tell us what they need to win. That is what we are trying to accomplish. Put the warfighter's perspective at the center of the software we deliver and do it iteratively at speed.”

In this case, think of a capability update for a ship much like downloading a new app on a smartphone. Today, some ships in the fleet can receive security updates for applications they've already downloaded, but they cannot download new applications. Navy officials expect that to change. The new capability would arrive as an automatic, over-the-air update or come pierside, but would not require an installation team as is the case today.

“Anytime there's a new capability or a new change, we're just going to do it the same way that you get that done on your smartphone,” said Delores Washburn, chief engineer at the Naval Information Warfare Center Pacific, which is leading the change. “What we will be able to [do] now is do a rapid update to the ships.”

Navy engineers hope to be able to push the updates as quickly as war fighters need them. “We're going to try to go slowly here because, again, we're having to tackle simultaneously cultural, technical and operational problems,” said Robert Parker, the deputy program executive officer for command, control, communications, computers and intelligence.

The Navy plans to test this new arrangement by installing a set of software, performing an update and then fairly quickly pushing that update to the ship.

https://www.c4isrnet.com/battlefield-tech/it-networks/2020/03/19/the-navy-will-test-pushing-new-software-to-ships-at-sea/

On the same subject

  • L3Harris, Raytheon win phase 2 contracts for next-gen ISR aerial sensors

    September 14, 2022 | International, C4ISR

    L3Harris, Raytheon win phase 2 contracts for next-gen ISR aerial sensors

    The sensors under development will integrate onto the Army's well-known HADES aerial ISR program, designed to conduct "deep" intelligence gathering and target tracking.

  • US Marine Corps Initiates Full-Rate Production for ACV-30

    November 10, 2024 | International, Naval

    US Marine Corps Initiates Full-Rate Production for ACV-30

    The contract is part of a framework agreement worth up to USD 329 million. 

  • New leader wants Cyber Command to be more aggressive

    July 24, 2018 | International, C4ISR

    New leader wants Cyber Command to be more aggressive

    By: Mark Pomerleau In his first public comments since assuming the head of U.S. Cyber Command, Gen. Paul Nakasone said the Department of Defense is taking a more aggressive approach to protect the nation's data and networks and aims to stay ahead of malicious cyber and information-related activity. The command's new vision, called “Achieve and Maintain Cyberspace Superiority," published in April, describes the notion of “continuous engagement” and “defending forward” to understand adversary weaknesses and impose “tactical friction and strategic costs.” “Through persistent action and competing more effectively below the level of armed conflict, we can influence the calculations of our adversaries, deter aggression, and clarify the distinction between acceptable and unacceptable behavior in cyberspace,” the document reads. Nakasone speaking July 21 at the Aspen Security Forum, said adversaries have long worked below the threshold of war to steal intellectual property, personally identifiable information and undermine societal discourse. While individually, these activities don't appear sensational, taken in aggregate, Nakasone said, they have grave national economic and security implications. Many academics have criticized the U.S. response to Russian election interference and noted that the United States tends to view conflicts through the binary lens of war or peace while competitors such as Russia see themselves constantly engaged in a state of war. From the U.S. perspective, many cyber acts are considered beneath the threshold of war, denoting a lesser response. But Nakasone said the philosophy of continuous engagement is more in line with the new National Defense Strategy, one that suggests the return of great power competition with nations such as Russia and China. In practice, Nakasone articulated a more aggressive approach, one that involves entering an adversary's network to learn what they are doing as a means of improving defenses. The philosophy is “this idea that we want to have our forces to be able to enable our defensive capabilities and to act forward,” Nakasone said. “Act outside of the boundaries of the United States to understand what our adversaries are doing and be able to engage those adversaries and obviously [be] able to better protect our networks, our data and our weapon systems. Such action, penetrating a network or sovereign territory, has not typically been an action a military organization has taken outside an engaged hostility with an organization or nation vice a covert action finding. Nakasone's predecessor told Congress that the command was mulling over cyber operations in nations where the United States is not actively involved in a conflict. Then Adm. Michael Rogers, explained he is comfortable with his authorities to use offensive cyber tactics in Iraq, Syria and Afghanistan, however, he added that they need more speed and agility in employing these capabilities “outside the designated areas of hostility.” https://www.fifthdomain.com/dod/cybercom/2018/07/23/new-leader-wants-cyber-command-to-be-more-aggressive/

All news