US Air Force Solicits Cutting Edge Cyber Technologies

Wednesday, January 18, 2012

Headlines

69dafe8b58066478aea48f3d0f384820

In an effort to maintain tactical and operational superiority, the US Air Force has released a Request for Information (RFI) on cyberspace science and technology (S&T) research.

"The Air Force is seeking information on revolutionary hardware and software cyber technology and systems as well as innovative Tactics, Techniques, and Procedures (TTP) that will support, augment and in some cases extend mission range and scope," the RFI explains.

The Air Force recognizes that every aspect of the military's operations now encompass a critical cyber technology element, and the latest RFI seeks to spur innovation across a broad range of activities.

"All domains have unique challenges, but each requires cyber solutions, therefore, a portfolio of technologies is required to meet the wide spectrum of future Air Force requirements," the RFI states.

Respondent submissions may eventually be included in the Air Force Cyber Vision 2025 study which seeks to formulate a long term strategy for the continued development and implementation of cutting edge cyber technologies in support of Air Force mission objectives.

"The Air Force operates missions in and through cyberspace, a human-created domain that knows no geographic boundaries (in contrast to air, land, sea and space). Cyberspace capabilities encompass not only hardware, software, information, and services, but also individuals, organizations, and missions. Air Force cyber requirements encompass cyber exploitation, defense and operations as well as doctrine, workforce development (education and training), acquisition and support," the Air Force states.

A central aspect of the RFI addresses the need for developing mitigation strategies to address multiple vulnerability points that threaten fundamental operational security.

"Cyber vulnerabilities open the way for exploitation by a range of threats. Threats include but are not limited to external, internal, supply chain, and may employ a diversity of methods such as denial, deception or social engineering and may have objectives of theft, disruption, and even physical destruction. Operations must be assured by mitigating vulnerabilities that adversaries might exploit and developing strategies and technology that assure missions in contested cyber environments. Special attention must be paid to dependencies on critical infrastructure and interdependencies with the defense industrial base, commercial providers, academia, non-profits and federal laboratories," the RFI continues.

The RFI indicates that researchers and vendors interested in consideration for these projects need to "provide an enhanced view of the technical concepts you are proposing, focusing on the advantages of the technology application and its applicability to the future Air Force needs, indicating if the idea is near-, mid-, or far-term. The description of each solution should include the current state of development and the predicted performance levels the technology should reasonably achieve. The description should justify why this is a revolutionary and not evolutionary idea but also provide evidence as to its technical realism/feasibility. This should include a technology readiness level, manufacturing readiness level (if appropriate), and cost."

Details on the RFI and submission of proposals can be found here:

Source:  https://www.fbo.gov/index?s=opportunity&mode=form&id=0a7c3a1ea401be585d4e05963c52ee9f&tab=core&_cview=0

Possibly Related Articles:
6807
Network->General
Software Security Strategies Research Government Military RFI Innovation Mitigation Air Force Request for Information Cyber Technology Air Force Cyber Vision 2025
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.