TECHNOLOGY AREA(S): Sensors, Weapons
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 5.4.c.(8) of the solicitation.
OBJECTIVE: Develop approaches and technologies that enable irrefutable and unalterable logging and maintaining of tamper events of commercial off-the-shelf (COTS)-based critical technology solutions without utilization of write-once memory.
DESCRIPTION: The proposed research and development project will provide a way to increase confidence levels to determine whether the detected event, in fact, was an infiltration. The application is for systems that do not have write-once memory and its processing capabilities. This irrefutable evidence should not compromise the systems functionality. This topic is not seeking solutions that use tamper-evident labels or security seals. Though the particular solution may be tailored for individual applications, the concept and methodology of the solution should be applicable to various COTS and military hardware. Preferred solutions should work without introducing additional performance risks or costs to the weapon platform and its mission. Additionally, focus on minimal impact to system availability and maintainability.
PHASE I: Research and develop methodologies for proof-of-concept on a representative system that has multiple protections other than this irrefutable evidence of event detection technology. The purpose should be to demonstrate the feasibility, uniqueness, and robustness of the protection that the proposed technology will offer. Estimate the performance impact.
PHASE II: Based on the Phase I research; develop, demonstrate and validate a prototype of the developed methodologies or techniques on a representative weapon platform. Conduct an analysis to evaluate the ability of the technology’s functional effectiveness in a real-world situation. The contractor should also identify any anticipated commercial benefit or application opportunities of the innovation.
PHASE III DUAL USE APPLICATIONS: Integrate the developed technology into a system application, for a system level test-bed. This phase will demonstrate the application to one or more military systems, subsystems, or components — as well as the product’s utility against industrial espionage. Conduct an analysis to evaluate the performance of the technology/technique in a real-world situation. For transition, consider a partnership with a current or potential supplier of missile defense systems, subsystems, or components.
COMMERCIALIZATION: The proposals should show how the innovation can benefit commercial business or that the innovation has benefits to both commercial and defense applications. The projected benefits of the innovation to commercial applications should be clear, whether they improve security, reduce cost, or improve the producibility or performance of products that utilize the innovative technology.
KEYWORDS: Technology Protection, IP Protection, Tamper Evidence, Forensic Investigation