DOD SBIR 24.2 Annual

Active
No
Status
Open
Release Date
April 17th, 2024
Open Date
May 15th, 2024
Due Date(s)
June 12th, 2024
Close Date
June 12th, 2024
Topic No.
N242-081

Topic

Electronic Threat Detection for Countermeasure Support

Agency

Department of DefenseN/A

Program

Type: SBIRPhase: BOTHYear: 2024

Summary

The Department of Defense (DOD) is seeking proposals for the topic of "Electronic Threat Detection for Countermeasure Support" as part of their SBIR 24.2 Annual solicitation. The Navy branch is specifically interested in this topic. The objective is to develop a technology capable of extracting actionable information from real-time and wideband electronic threats, including low-probability-of-intercept (LPI)/low-probability-of-detection (LPD) transmissions, to support electronic attack countermeasures. The technology should be able to identify threats quickly and accurately in dynamic operational environments, such as noisy environments, weak signals, and heavy interference. Proposals should include a detailed plan for an experimental demonstration during Phase I and a functional prototype platform by the end of Phase II. The proposed effort should utilize Commercial Off-the-Shelf (COTS) hardware as much as possible. The Phase I feasibility study should demonstrate the feasibility of the proposed wideband threat detection mechanisms, and Phase II should develop a prototype system that overcomes the technical limitations identified in Phase I. The work in Phase II may become classified. Phase III dual-use applications include including the demonstrated prototype in an end-to-end receiver demonstration for a classified program. The importance of encrypted communications and the reduction of pressure on password keys are also mentioned. The solicitation provides references and keywords related to the topic. The application due date is June 12, 2024. For more information, visit the SBIR topic link or the solicitation agency URL.

Description

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software

 

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

 

OBJECTIVE: Demonstrate a technology capable of extracting actionable information from in real-time and wideband electronic threats including low-probability-of-intercept (LPI)/low-probability-of-detection (LPD) transmissions to support electronic attack countermeasures. For this technology, develop a set of performance metrics to identify which threats may be identified, and what information may be extracted from the detected threat.

 

DESCRIPTION: Knowledge of the electromagnetic battlefield is imperative for any situational awareness (SA) system. Monitoring persistent threats allows for appropriate countermeasures and the development of effective tactics to neutralize or exploit them. Such threats may include unauthorized communication signals in our networks or red force communications, radar emissions, and other forms of electronic warfare signals. These SA systems must be able to identify threats quickly and accurately in dynamic operational environments to provide meaningful information to an operator or Electronic Warfare (EW) system. These environments may include adverse conditions such as dense, irrelevant signals density (a “noisy environment”), weak signals with low-signal-to-noise ratios, LPI/LPD transmissions, heavy cosite interference, and jamming. LPI/LPI threats can include waveforms that employ fast frequency hopping or Direct Sequence Spread Spectrum techniques (DSSS).

 

Proposals must define a detailed path to an experimental demonstration of the proposed threat detection mechanisms during the Phase I period and an expanded plan for demonstrating a functional prototype platform before the end of the Phase II period. Phase I should include a detailed synopsis of the technology’s threat information extraction capabilities, its limitations, a roadmap to overcome these limitations, and a feasible proposed platform for Phase II execution. A successful Phase II should include a non-hardened prototype capable of ingesting real-time data and characterize the prototype in terms of the performance metrics defined in Phase I. It is anticipated that the hardware elements sufficient to develop, test, and demonstrate electronic threat detection already exist. Therefore, the proposed effort should utilize Commercial Off-the-Shelf (COTS) hardware as much as practical.

 

Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. owned and operated with no foreign influence as defined by 32 U.S.C. § 2004.20 et seq., National Industrial Security Program Executive Agent and Operating Manual, unless acceptable mitigating procedures can and have been implemented and approved by the Defense Counterintelligence and Security Agency (DCSA) formerly Defense Security Service (DSS). The selected contractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances. This will allow contractor personnel to perform on advanced phases of this project as set forth by DCSA and NAVAIR in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material during the advanced phases of this contract IAW the National Industrial Security Program Operating Manual (NISPOM), which can be found at Title 32, Part 2004.20 of the Code of Federal Regulations.

 

PHASE I: Demonstrate the feasibility of the proposed wideband threat detection mechanisms of countermeasure support functionality. The threshold and objective performance of wideband threat waveform are 1 GHz and 2 GHz respectively. A successful Phase I should include a detailed synopsis of the technology’s threat information extraction capabilities, its limitations, a roadmap to overcome these limitations, and a feasible proposed platform for Phase II execution. Prepare a preliminary Phase II plan that describes how to scale the performance metrics explored within the Phase I feasibility study. The Phase I effort will include prototype plans to be developed under Phase II.

 

PHASE II: Develop a prototype system that can demonstrate the threat information extraction performed in Phase I. Include a non-hardened prototype capable of ingesting real-time data and characterize the prototype in terms of the performance metrics defined in Phase I. Phase II shall overcome the technical limitations outlined in Phase I, and further quantify which limitations are insurmountable and therefore bound the scope of system capabilities.

 

Work in Phase II may become classified. Please see note in Description paragraph.

 

PHASE III DUAL USE APPLICATIONS: Include the demonstrated prototype in an end-to-end receiver demonstration for a classified program.

The importance of encrypted communications has become obvious to many industries after their demonstration by the criminal world. If the signals are hard to detect, the pressure on the robustness of password keys is sharply reduced.

 

REFERENCES:

Elmasry, G. F. “Tactical wireless communications and networks: Design concepts and challenges.” John Wiley & Sons, 2012. https://www.worldcat.org/title/860533972
Yochim, J. A. “The vulnerabilities of unmanned aircraft system common data links to electronic attack [Master’s thesis, U.S. Army Command and General Staff College, Fort Leavenworth, Kansas.” Defense Technical Information Center, 2010. https://apps.dtic.mil/sti/pdfs/ADA525301.pdf
Zohuri, B. “Electronic countermeasure and electronic counter-countermeasure.” Radar Energy Warfare and the Challenges of Stealth Technology, 2020, pp. 111-145. https://doi.org/10.1007/978-3-030-40619-6_2
“National Industrial Security Program Executive Agent and Operating Manual (NISP), 32 U.S.C. § 2004.20 et seq. 1993”. https://www.ecfr.gov/current/title-32/subtitle-B/chapter-XX/part-2004

 

KEYWORDS: Low-probability-of-detection; low-probability-of-interception; situational awareness; EW counter-measures; threat recognition; digital signal processing

Similar Opportunities

DOD SBIR 24.4 Annual - NAVWAR Open Topic for Advanced Data Integrity and Control Methods
Department of Defense
The Department of Defense (DOD) is seeking proposals for the NAVWAR Open Topic for Advanced Data Integrity and Control Methods. The objective of this solicitation is to develop a method to assure integrity, control access, and distribution for information on any device or network. The DOD requires the ability to securely move information from anywhere to anywhere, and once delivered, ensure its integrity, control access, and limit further distribution. The current approach to achieving this relies on networks and applications, but the DOD is exploring methods to control data independent of an application or platform. Proposed solutions must protect data independent of networks, applications, or database technologies, function in disrupted, disconnected, intermittent, and low-bandwidth situations, and recover gracefully once connectivity is restored. The Phase I awards for this topic will have a period of performance of four months and a cost not to exceed $75,000, while Phase II will involve a small-scale deployment of the proposed concept. Phase III will focus on integrating the capability demonstrated in Phase II with current Naval networks. The technology developed through this solicitation has potential applications beyond the defense domain and can benefit anyone working with sensitive information.
DOD SBIR 24.4 Annual - Tactical Implementation of Quantum Hardening
Department of Defense
The Department of Defense (DOD) is seeking proposals for the topic "Tactical Implementation of Quantum Hardening" as part of its SBIR program. The objective is to develop a tactical implementation of quantum hardening for Army systems on a tactical network to identify vulnerabilities, remove or remediate them, and maintain security against quantum cyber threats. The Army is interested in software that can future-proof Army networks related to quantum computing vulnerabilities. The ideal solution is a holistic suite of quantum-resistant security applications that can assess cryptographic security, implement quantum-resistant algorithms, and provide a crypto-agile framework to protect sensitive data. The project will involve analyzing Army networks, prioritizing critical networks, and transitioning to a quantum-safe architecture. The performer will prototype a software suite at technology readiness level 6, demonstrated in relevant environments. The project will have a Phase I and Phase II, with Phase II delivering a prototype for further Army evaluation. The performer will have access to a lab with tactical network capabilities and associated devices for iteration. The project will also include demonstrations at NetModX events in 2024 and 2025. Awardees may be eligible for a Phase IIb award after completing Phase II. Phase III will focus on commercialization objectives. The project is open for proposals until March 31, 2025. For more information, visit the solicitation agency URL: [link](https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/).
DOD SBIR 24.4 Annual - Ensuring Sensor Data Security and Integrity
Department of Defense
The Department of Defense (DOD) is seeking proposals for the topic "Ensuring Sensor Data Security and Integrity" as part of its SBIR program. The objective of this topic is to develop a platform that secures sensor data at the individual record level and supports experimentation to advance technology for DoD and Army Data Strategy VAULTIS goals. The platform should be cost-effective, flexible, and implemented through an Application Programming Interface (API) with no data size limitation. It should also ensure the integrity of sensor data throughout its lifecycle and incorporate attributes such as encryption, immutable data storage, audit and logging, and tamper-proof chain of custody. The Army aims to become more data-centric and capable of conducting operations in contested environments. The project will be conducted in two phases, with Direct to Phase II (DP2) proposals accepted for a cost of up to $2,000,000 for an 18-month period of performance. The contractor will be responsible for integrating, testing, demonstrating, and delivering a lightweight and scalable prototype data provenance solution. The solution should secure all sensor data at the individual record level and include database, replication, data audit, and encryption in a single integrated solution. It should also incorporate knowledge graphs, analytic visualization tools, and support data analysis. The use of blockchain technology is highlighted as a potential dual-use application for protecting sensor data fidelity in various sectors such as healthcare, critical infrastructure, smart homes, and autonomous vehicles. The project references the Army's data plan and strategic goals for 2040. The deadline for proposal submission is March 31, 2025. For more information, visit the solicitation link provided: [DOD SBIR 24.4 Annual](https://www.sbir.gov/node/2608861).
DOD SBIR 24.4 Annual - AI/ML Augmented Antenna Systems for Contested Electromagnetic Environments
Department of Defense
The Department of Defense (DOD) is seeking proposals for the topic of "AI/ML Augmented Antenna Systems for Contested Electromagnetic Environments" as part of their SBIR 24.4 Annual solicitation. The objective of this topic is to demonstrate the utility of using artificial intelligence/machine learning (AI/ML)-driven spatial and spectral techniques to improve the resilience of fire control and tactical squad communication systems in contested electromagnetic environments. The Army is specifically looking for novel advancements in antennas with spatial and spectral degrees of freedom combined with AI/ML techniques to support RF system agility and resilience at tactically relevant SWaP-C (Size, Weight and Power-Cost). The project will be conducted in three phases: - Phase I: Conduct a proof-of-concept study to show feasibility of the technical approach to improve the resilience of RF subsystems. Metrics to be considered include communication and radar performance when AI/ML techniques are implemented in the antenna. Phase I performers will deliver a proposed system approach for detailed design and demonstration during Phase II. - Phase II: Develop a prototype digital antenna system that can demonstrate the advantages of the offeror's digital antenna technology in a laboratory environment. The system should show spatial and/or spectral interference mitigation in response to the electromagnetic environment. Phase II deliverables will include a comprehensive technical report and a commercialization/transition plan for Department of Defense (DoD) use. - Phase III: Complete the maturation of the technology developed in Phase II for transition into a fieldable Army mission capability. This phase will involve production of prototype systems to support further development and commercialization. The proposer will work with an Army prime or industry transition partner to fully develop, integrate, and test the design for integration onto the target transition system. The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR) or the Export Administration Regulation (EAR). Offerors must disclose any proposed use of foreign nationals and their country of origin. The solicitation is currently open, and the application due date is March 31, 2025. For more information and to submit a proposal, visit the DOD SBIR website.