You are here

DIGITAL ENGINEERING - High-Speed Data Return for Tactical Environments


OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. OBJECTIVE: Develop a solution to utilize data that would otherwise be wasted, and use it to determine near real-time solutions for ongoing and soon to be executed missions. DESCRIPTION: U.S. Navy aviation platforms continue to add sensors and storage for data/intelligence collection. While some of that data informs battlespace management teams, often subtle, useful data returns with the platforms after a mission, without being analyzed and exploited. There is no current process to cull and analyze such data for timely (real-time/near real-time) and useful information (not already identified and designated in the real-time battlespace management arena) capable of informing mission planning and tactics development teams for near-future exploitation. Hand analysis alone by individuals is unlikely to meet this need. Therefore, the Navy requires high-speed data returns for tactical environments. Today there exists a need to create/enhance the ability to download, aggregate, and analyze seemingly innocuous or inconclusive data gathered by tactical and strategic sensors and provide possible tactically relevant conclusions for timely (hours/days) exploitation to mission planners. Within the Department of Defense and similar agencies, there could certainly be vast opportunities for technology transfer and adaptation. The analysis and use of meta-data within law enforcement and similar agencies is a useful guide. Adaptations outside the armed forces could also be numerous, depending on adaptability of any software and/or algorithms involved (biomedical, etc.). Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. owned and operated with no foreign influence as defined by DoD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures can and have been implemented and approved by the Defense Counterintelligence and Security Agency (DCSA) formerly Defense Security Service (DSS). The selected contractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances. This will allow contractor personnel to perform on advanced phases of this project as set forth by DCSA and NAVAIR in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advanced phases of this contract. PHASE I: Design, develop, and demonstrate feasibility of data aggregation, analysis, and exploitation construct that meets tactically relevant mission planning timelines (minutes/hours) between various sea, air, space, and cyber mission planning tools. The Phase I effort will include prototype plans to be developed in Phase II. PHASE II: Finalize, test, and demonstrate a prototype that can locally aggregate, analyze, and exploit tactically relevant information – not exploited/exploitable during real-time battle management –gathered by disparate naval aviation platforms for follow-on mission planning. Work in Phase II may become classified. Please see note in Description paragraph. PHASE III DUAL USE APPLICATIONS: This is an issue that transcends naval air platforms as it addresses the efficient utilization of data in a virtual environment where there is an overabundance of data being collected and stored, but not always utilized. Massive amounts of data being collected and then stored without being utilized for its near real-time value is not limited to armed forces, it is an issue that can be alleviated within private sectors supporting critical infrastructure. REFERENCES: 1. de Vieilleville, F., May, S., Lagrange, A., Dupuis, A., Ruiloba, R., Mboula, F. N., Bitard-Feildel, T., Nogues, E., Larroche, C., & Mazel, J. (2020, December). Actes de la conférence CAID 2020. CAID 2020 - Second Conference on Artificial Intelligence for Defence, Rennes, France. 2. GCN Staff. (2020, September 9). Automated analytics for the tactical edge. GCN. 3. Department of Defense. (2006, February 28). DoD 5220.22-M National Industrial Security Program Operating Manual (Incorporating Change 2, May 18, 2016). Department of Defense. KEYWORDS: Tactical intelligence; data management; mission planning; air platform; data exploitation; data analysis
US Flag An Official Website of the United States Government