COMPUTER VIRUS ELECTRONIC COUNTERMEASURES (ECM)

Award Information
Agency:
Department of Defense
Branch
Army
Amount:
$56,937.00
Award Year:
1991
Program:
SBIR
Phase:
Phase I
Contract:
n/a
Agency Tracking Number:
15983
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
Sparta Inc
23041 Avenida De La Carlota -, Ste 400, Laguna Hills, CA, 92653
Hubzone Owned:
N
Socially and Economically Disadvantaged:
N
Woman Owned:
N
Duns:
n/a
Principal Investigator:
Doug Price
Principal Investigator
(703) 448-0210
Business Contact:
() -
Research Institution:
n/a
Abstract
C(3)CM WAS CONCEIVED AS AN APPROACH FOR ATTACKING MILITARY COMMAND & CONTROL SYSTEMS. IT IS DEFINED AS "AN INTEGRATED PROCESS WHICH USES OPSEC, MILITARY DECEPTION, JAMMING, AND PHYSICAL DESTRUCTION, SUPPORTED BY INTELLIGENCE, TO DENY INFORMATION, INFLUENCE, DEGRADE, OR DESTROY ADVERSARY C(3) CAPABILITIES. IN AN ADP NETWORK CONTEXT, WE CAN DERIVE AN ANALOGOUS APPROACH FOR ATTACKING NETWORKED ADP SYSTEMS. FOR FIVE YEARS, SPARTA HAS BEEN INVESTIGATING THE USE OF C3(CM) AS A WAY TO EVALUATE THE SECURITY OF A COMPUTER NETWORK. IN THIS STUDY, WE PROPOSE TO LOOK AT THIS PROBLEM IN THE REVERSE DIRECTION: TO APPLY COMPUTER SECURITY ATTACK METHODS AS A C3(CM) TECHNIQUE DIRECTED AGAINST COMMAND & CONTROL NETWORKS. RECENT EVENTS HAVE DEMONSTRATED THE DESTRUTIVE IMPACT THAT COMPUTER VIRUSES AND OTHER FORMS OF MALICIOUS CODE CAN HAVE ON COMPUTER SYSTEMS. THE QUESTION ARISES AS TO WHETHER COMPUTER VIRUS BASED TECHNIQUES CAN BE USED AS A MEANS FOR ATTACKING A C(2) NETWORK. IN THIS PROPOSED STUDY, SPARTA, INC. WILL EVALUATE THE FEASIBILITY OF USING COMPUTER VIRUSES AS AN EFFECTIVE ECM TECHNIQUE.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government