[Infowarrior] - RFP: Dominant Cyber Offensive Engagement and Supporting Technology

Richard Forno rforno at infowarrior.org
Wed May 14 00:44:30 UTC 2008


Dominant Cyber Offensive Engagement and Supporting Technology
Solicitation Number: BAA-08-04-RIKA
Agency: Department of the Air Force
Office: Air Force Materiel Command
Location: AFRL - Rome Research Site

< - ->

http://tinyurl.com/3egwsb

< - >

I. FUNDING OPPORTUNITY DESCRIPTION:

Air Force Research Laboratory (AFRL)/RI is soliciting white papers for  
various scientific studies and experiments to increase our knowledge  
and understanding of the broad range of capabilities required in  
support of Dominant Cyber Offensive Engagement and Supporting  
Technology, to include testing of prototype capabilities. Solutions to  
basic and applied research and engineering for the problems relating  
to Dominant Cyber Offensive Engagement and Supporting Technology are  
sought. This includes high risk, high payoff capabilities for gaining  
access to any remotely located open or closed computer information  
systems; these systems enabling full control of a network for the  
purposes of information gathering and effects based operations. Of  
interest are any and all techniques to enable user and/or root level  
access to both fixed (PC) or mobile computing platforms. Robust  
methodologies to enable access to any and all operating systems, patch  
levels, applications and hardware are of interest. Also, we are  
interested in technology to provide the capability to maintain an  
active presence within the adversaries' information infrastructure  
completely undetected. Of interest are any and all techniques to  
enable stealth and persistence capabilities on an adversaries  
infrastructure. This could be a combination of hardware and/or  
software focused development efforts.

Following this, it is desired to have the capability to stealthily  
exfiltrate information from any remotely-located open or closed  
computer information systems with the possibility to discover  
information with previously unknown existence. Any and all techniques  
to enable exfiltration techniques on both fixed and mobile computing  
platforms are of interest. Consideration should be given to  
maintaining a "low and slow" gathering paradigm in these development  
efforts to enable stealthy operation. Finally, this BAA's objective  
includes the capability to provide a variety of techniques and  
technologies to be able to affect computer information systems through  
Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects. Of interest are  
any and all techniques including enabling D5 effects to computers and  
their networks; integration of effects with Access, Stealth and  
Persistence and Cybint capabilities; command and control of effects;  
and determining effects' link to operational impact. In addition to  
these main concepts, we desire to have research efforts in the  
supporting areas including (but not limited to): Information Assurance  
through Flattened Computer Architectures in special application/user  
environments; NGPSec: Secure Next Generation Protocol Suite to  
investigate feasibility and determine whether reinventing the network  
protocol stack can be done and the resulting success quantified;  
Proactive Botnet Defense Technology Development specifically as  
applies to new ideas/concepts for practical application; Carbon  
nanotubes for high density interconnects and RF applications, to allow  
for incorporating novel IA designs into computer architectures through  
nanotube interconnects with nanotube based RF peripherals (antennas).

Research efforts under this program are expected to result in complete  
functional capabilities ideally addressing the Dominant Cyber  
Offensive Engagement problem. However, projects specializing in highly  
novel and interesting applicable techniques will also be considered,  
if deemed to be of "breakthrough" quality and importance. The  
effectiveness of the developed technologies for potential operational  
use will be assessed through preplanned testing and evaluation  
activities. Technologies that can be transitioned for operational use  
are of high interest. Offerors are encouraged to describe the pre- 
conditions that are necessary for the proposed techniques to work  
efficiently.

Offerors are encouraged to submit classified white papers via the  
appropriate channels. Contact the technical point of contact listed in  
Section VII before submitting any classified white papers.

This effort includes any and all techniques to enable user and/or root  
level access to both fixed (PC) or mobile computing platforms, using  
robust methodologies to enable access to operating systems, patch  
levels, applications, and hardware of interest. Further techniques  
include enabling of stealth and persistence capabilities on an  
adversarial infrastructure, possibly in combination with hardware and/ 
or software focused development. In addition, other areas include  
techniques to enable exfiltration on both fixed and mobile computing  
platforms with consideration given to maintaining a "low and slow"  
gathering paradigm to enable stealthy operation. Finally the effort  
includes any and all techniques to enable D5 effects to computers/ 
networks; and integration of these effects with access, stealth,  
persistence, Cybint capabilities; command and control of effects; and  
determination of effects link operational impact. Deliverables will be  
technical reports, software, demonstrations, and results of  
experiments which provide evidence and metrics concerning the  
assertions/claims about the research. Demonstrations may involve  
exploratory development models (ie brassboards) if appropriate.


More information about the Infowarrior mailing list