Navy official calls for rapid deployment of unmanned vessels

Chief of Naval Operations Gary Roughead said he expects to take unmanned underwater vehicles from experimentation to routine deployments by the end of the decade, boosting the Navy's ability to detect mines, survey coastlines and conduct other sea missions.

Roughead's comments dovetail with findings in the Pentagon's recently released Quadrennial Defense Review of military capabilities and requirements, which urges the Navy to pursue crewless subsurface ships as the military continues to procure and use unmanned aerial vehicles in record numbers.

"I think that unmanned underwater vehicles have potentially greater value than maybe even ... the aerial vehicles; I submit that the underwater is more stressing, it's harder" on people than flight, Roughead said in an interview at the Pentagon this week. "And therefore I think the ability to use underwater vehicles can give you, I think, more of a payback than an aerial vehicle can."

The Navy, which has been experimenting with UUV technologies, would likely deploy the vessels for the same types of intelligence gathering and reconnaissance missions that have made UAVs so successful in Iraq and Afghanistan.

The sensors, Roughead said, can be integrated into a network, dormant for long periods of time and operate at greater depths than manned systems -- all major pluses for the fleet. "I think there's huge value," the chief said.

But the Navy's biggest challenge is how to power the underwater systems, which would be deployed at sea for weeks or months. Navy researchers are exploring new technologies, including various types of fuel cells, to power the systems.

"The challenge that we have is not so much on the sensor packages, but how do you build a vehicle that stays out there for weeks because you have to put power in a very compact space?" Roughead said.

He signaled that he wants the Navy to be aggressive in fielding the new technologies by continuing to test them during their first missions at sea rather than waiting to field the systems after they are thoroughly vetted.

"If there's something that I think is ready to go, that we can push it out there and learn from and that we have the reliability so that we're not going to incur a significant loss, I'm willing to do that," Roughead said.

As the Navy looks to unmanned possibilities in the future, it is managing an fiscal 2011 budget portfolio that includes a request for nine new hulls, including two Virginia-class submarines, two DDG-51 Arleigh Burke-class destroyers, two Littoral Combat Ships, one Landing Helicopter Assault Replacement, one Mobile Landing Platform, and one Joint High Speed Vessel.

Roughead said the request "puts us on the path" to the Navy's goal of fielding a fleet of at least 313 modern ships. The Navy now has 285 ships.

Key to hitting that goal is the Littoral Combat Ship, a program that was restructured last year after costs on two shallow-water vessels being developed separately by Lockheed Martin Corp. and General Dynamics Corp. more than doubled. The Navy plans to buy 55 of the ships.

Under the restructured program, the Navy is expected to pick one of the firms this summer to build two ships a year between fiscal 2010 and fiscal 2014. The winning contractor would have an exclusive contract until fiscal 2012, when the Navy would solicit bids for a new contract to build five more ships of the same design by fiscal 2014.

Roughead signaled that price will be a prevailing factor in selecting the contractor. Congress has set a cost cap of $480 million per ship for the LCSs, which were initially expected to cost $220 million apiece.

"Both designs fit what we wanted that ship to be able to do," he said. "They're dramatically different in appearance, but they both fit the bill. It's a question of cost."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.