GAO: Future Combat Systems network still more concept than reality

The number of lines of software code the Army needs to develop for its Future Combat Systems program has tripled to 95.1 million lines since 2003, and "it is not yet clear if or when the information network, which is at the heart of the FCS concept, can be developed, built and demonstrated," the Government Accountability Office reported on Monday.

The Army tapped Boeing Co. and SAIC in 2002 as lead systems integrators to develop FCS, an ambitious project estimated to cost anywhere from $164 billion to more than $230 billion. The project's aim is to link manned and unmanned ground and air vehicles, sensor systems and military commanders in a complex network designed to allow soldiers to see and hit the enemy first, rather than relying on heavy armor to withstand attack.

That involves writing software and implementing technology to link the people, platforms, weapons and sensors together. The basic FCS Brigade Combat Team network will stitch together 5,000 nodes on more than 1,500 radios supporting multiple subnetworks connected by gateways with 3 million information exchange requirements. But GAO noted in the report GAO-08-409 that to date the Army and its contractors have only demonstrated basic network concepts, such as connections and exchange of information between a limited number of network nodes.

The Army is still stabilizing its requirements and hardware and software designs have not matured, GAO reported. The first major demonstration of the FCS network will take place in fiscal 2012, about a year before the Army plans to start low-rate initial production of FCS hardware, such as infantry and reconnaissance vehicles, cannons, mortars, and robotic air and ground vehicles.

Congress, in the fiscal 2008 Defense authorization measure, said it would not approve production of such hardware until the completion of a successful network test.

The Army told GAO that the sharp increase in the lines of code needed to run FCS systems stems from an underestimation of the amount of operating system software required. The report found that the Army, Boeing and SAIC contributed to code growth with "inaccurate software sizing estimates," and noted that the Institute for Defense Analyses has estimated that the growth in code will add $3 billion to the overall FCS development cost.

Lack of stable development requirements also contributed to an increase in the amount of code required, GAO said, reporting that four out of five of the FCS software developers it met with (out of a total of 14) reported that problems with requirements have resulted in functionality being deferred to future versions.

"Deferring work into the future means that the associated software code writing and testing will take place later than planned, meaning that more code will be written later and the associated functionality will not be testable until later," the report stated.

This, GAO said, "indicates that less functionality than planned has been delivered and that software estimates will only grow larger in future builds."

The basic architecture of the FCS network also could frustrate Army efforts to develop the battlefield networks at the core of the system, the GAO report said. Unlike commercial wireless systems in which every node is connected to the Internet by a single link, in FCS, most network nodes will not have direct access to the network.

Instead, each radio must act as a router, meaning it will pass voice, video and data traffic from its subscribers as well as other radios and their subscribers. This, GAO said, could lead to a situation in which all fixed capacity on the network is consumed for routing traffic between radios and nodes, and there is no capacity to transmit information.

The magnitude, size and complexity and of the network and software development required for FCS are "unprecedented" in the history of the Defense Department, GAO said. "Because the performance of the network and the success of the software effort are not assured," the report said, "decision-makers should allow for the possibility that full success will not be achieved…. it will be wise to keep alternative courses of action viable to guard against such an eventuality."

John Pike, a defense analyst and director of, said that the Army should restructure FCS, backing away from a grand plan of developing everything at once and taking an incremental approach. Pike said the Army also might need to scale back the scope of FCS to focus on what it needs rather than what it desires.

Philip Coyle, senior adviser with the Center for Defense Information, a security policy research organization in Washington, agreed, and said developing FCS piecemeal would be a better approach. Coyle also faulted the Army for outsourcing responsibility for FCS to Boeing and SAIC, saying "this does not put the Army in the position of a good customer."

Pike said FCS is yet another example of "the lead system integrator concept being oversold." But, he added, Defense cannot hold onto people with the capability to oversee projects such as FCS "when they can make more money in the private sector."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.