Opportunity Details
Tracking Number

SWX-2025-154

Organization

SOFWERX / USSOCOM

Start Date

Jun 4, 2025  ET

End Date

Jul 23, 2025  ET

Current Status

Open

Registration

N/A

1 Attachment

To find out more information about this Opportunity, please signin or register for an account.
testimonial
SBIR 25.4 Release 9: Secure and Protect Infrastructure through Cyber-threat Emulation (SPICE)
Opportunity Summary
Description
SOCOM254-P005: PEO SOF Warrior - Secure and Protect Infrastructure through Cyberthreat Emulation (SPICE) Open Topic. The objective of this SBIR Open Topic is to develop applied research toward an innovative capability within USSOCOM Program Offices. Cyber capabilities rapidly evolve. Cyber Security professionals require new techniques and capabilities to perform offensive, defensive, and evaluation activities in support of Special Operations. Proposals should address techniques, technologies, or similar research areas that results in an increase to cyber-related capabilities.
Opportunity Details

PROGRAM OFFICE: PEO SOF WARRIOR

Technology Area of Interest: Next-Generation Targeting and Effects.

Requested Research Fields Supporting Area of Interest. Any single or combination of:

  1. (U) Cyber-related capabilities to support Next-Generation Targeting and Effects including the exploitation of information systems and embedded devices. Proposals should focus on cyber-related technologies that enable remote operational control or network reconnaissance against a given target system or network. Vendors should prioritize remote code execution, privilege escalation, and persistence mechanisms against operating systems, software, or embedded devices that are unique from existing published methodologies. 
  2. (U) Cyber-related capabilities and payloads to deny, disrupt, degrade, or destroy information or embedded systems. Proposals should focus on novel techniques and payloads which create effects in support of Special Operations against information systems, devices, or adjacent but cyber-related systems. Vendors should demonstrate effects on information systems or operational technology and how to employ during Cyber-threat emulation or red-team activities. 
  3. (U) Alternative access mechanisms to protected information systems and networks. Proposals should focus on creating new methods of access to previously inaccessible information systems by leveraging adjacent information systems, devices, or technologies. Vendors should provide techniques and technologies that allows for network infiltration and bi-directional communication using non-public or published methodologies 
  4. (U) Wireless network sensing and exploitation system integrated with existing commercial command and control (C2) systems. Proposals should focus on operational understanding and tasking of cyber related capabilities integrated into an existing commercial C2 systems. Vendors should provide techniques or technology that is integrated with commercial C2 systems that demonstrate exploitation of an information system’s wireless communications system, visualization of information environment, or the operational tasking of information related capabilities. 

PHASE I:

Conduct a feasibility study to assess what is in the art of the possible that satisfies the requirements specified in the above paragraphs entitled “Objective” and “Description.” The objective of this USSOCOM Phase I SBIR effort is to conduct and document the results of a thorough feasibility study (“Technology Readiness Level 3”) to investigate what is in the art of the possible within the given trade space that will satisfy a needed technology. The feasibility study should investigate all options that meet or exceed the minimum performance parameters specified in this write up. It should address the risks and potential payoffs of the innovative technology options that are investigated and recommend the option that best achieves the objective of this technology pursuit. The funds obligated on the resulting Phase I SBIR contracts are to be used for the sole purpose of conducting a thorough feasibility study using scientific experiments and laboratory studies as necessary. Operational prototypes will not be developed with USSOCOM SBIR funds during Phase I feasibility studies. Operational prototypes developed with other than SBIR funds that are provided at the end of Phase I feasibility studies will not be considered in deciding what firm(s) will be selected for Phase II. A phase II proposal is expected at the conclusion of the Phase I effort.

PHASE II:

Develop, install, and demonstrate a prototype system determined to be the most feasible solution during the

Phase I feasibility study.

PHASE III DUAL USE APPLICATIONS:

This system could be used in a broad range of military, intelligence, law enforcement, and commercial applications.

REFERENCES:

  1. https://www.socom.mil/SOF-ATL/Pages/programs_new.aspx
  2. https://www.socom.mil/SOF-ATL/Pages/capability_AOI.aspx 
  3. https://ieeexplore.ieee.org/document/9074317 
  4. https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-airgapped-devices 
  5. https://nsarchive.gwu.edu/document/16681-joint-chiefs-staff-joint-publication-3-12  


How You Can Participate
Industry, Academia, National Labs, and Non-Traditional Attendees

  1. Review Topic Instructions: Click Here to Review
  2. RSVP for the Q&A Telecon on 17 June 2025: Click Here to RSVP (RSVP NLT 16 June 2025 11:59 PM ET)
  3. Submit your proposal: Submissions Open 25 June 2025 12:00 PM ET (Noon)

 

Questions?

For event-related questions, please contact SBIR


For more information about this opportunity Click Here

Keywords
Cyber, Networks, Cyber-threat Emulation, Next Generation Targeting, Effects, Forensics, Defense, ISR, 802.11, Red Teaming
Reference URL
Not Provided
Point of Contact

Name

SOFWERX Team

Email

info@sofwerx.org

Title

Not Provided

Phone

Not Provided