PROGRAM OFFICE: PEO SOF WARRIOR
Technology Area of Interest: Next-Generation Targeting and
Effects.
Requested Research Fields Supporting Area of Interest. Any
single or combination of:
- (U) Cyber-related capabilities to support
Next-Generation Targeting and Effects including the exploitation of
information systems and embedded devices. Proposals should focus on
cyber-related technologies that enable remote operational control or
network reconnaissance against a given target system or network. Vendors
should prioritize remote code execution, privilege escalation, and persistence
mechanisms against operating systems, software, or embedded devices that
are unique from existing published methodologies.
- (U) Cyber-related capabilities and payloads to
deny, disrupt, degrade, or destroy information or embedded systems.
Proposals should focus on novel techniques and payloads which create effects in
support of Special Operations against information systems, devices, or
adjacent but cyber-related systems. Vendors should demonstrate effects on
information systems or operational technology and how to employ
during Cyber-threat emulation or red-team activities.
- (U) Alternative access mechanisms to protected
information systems and networks. Proposals should focus on creating new
methods of access to previously inaccessible information systems by leveraging
adjacent information systems, devices, or technologies. Vendors should
provide techniques and technologies that allows for network infiltration
and bi-directional communication using non-public or
published methodologies
- (U) Wireless network sensing and exploitation
system integrated with existing commercial command and control (C2) systems.
Proposals should focus on operational understanding and tasking of cyber
related capabilities integrated into an existing commercial C2 systems. Vendors
should provide techniques or technology that is integrated with commercial C2
systems that demonstrate exploitation of an information system’s wireless
communications system, visualization of information environment, or the
operational tasking of information related capabilities.
PHASE I:
Conduct a feasibility study to assess what is in the art of
the possible that satisfies the requirements specified in the above paragraphs
entitled “Objective” and “Description.” The objective of this USSOCOM Phase I
SBIR effort is to conduct and document the results of a thorough feasibility study
(“Technology Readiness Level 3”) to investigate what is in the art of the
possible within the given trade space that will satisfy a needed technology.
The feasibility study should investigate all options that meet or exceed the
minimum performance parameters specified in this write up. It should address
the risks and potential payoffs of the innovative technology options that are
investigated and recommend the option that best achieves the objective of this
technology pursuit. The funds obligated on the resulting Phase I SBIR contracts
are to be used for the sole purpose of conducting a thorough feasibility study
using scientific experiments and laboratory studies as necessary. Operational
prototypes will not be developed with USSOCOM SBIR funds during Phase I
feasibility studies. Operational prototypes developed with other than SBIR
funds that are provided at the end of Phase I feasibility studies will not be
considered in deciding what firm(s) will be selected for Phase II. A phase II
proposal is expected at the conclusion of the Phase I effort.
PHASE II:
Develop, install, and demonstrate a prototype system
determined to be the most feasible solution during the
Phase I feasibility study.
PHASE III DUAL USE APPLICATIONS:
This system could be used in a broad range of military,
intelligence, law enforcement, and commercial applications.
REFERENCES:
- https://www.socom.mil/SOF-ATL/Pages/programs_new.aspx
- https://www.socom.mil/SOF-ATL/Pages/capability_AOI.aspx
- https://ieeexplore.ieee.org/document/9074317
- https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-airgapped-devices
- https://nsarchive.gwu.edu/document/16681-joint-chiefs-staff-joint-publication-3-12
How
You Can Participate
Industry, Academia, National Labs, and Non-Traditional Attendees
- Review
Topic Instructions: Click Here to Review
- RSVP
for the Q&A Telecon on 17 June 2025: Click Here to RSVP (RSVP
NLT 16 June 2025 11:59 PM ET)
- Submit your proposal: Submissions Open 25 June 2025 12:00 PM ET (Noon)
Questions?
For
event-related questions, please contact SBIR
For more information about this opportunity Click Here
Cyber, Networks, Cyber-threat Emulation, Next Generation Targeting, Effects, Forensics, Defense, ISR, 802.11, Red Teaming
Not Provided